Build Log (Full)
trunk standard nss-vm-darwin9-1 Darwin 32bit OPT on 2012/11/27 17:22:58
Show Brief Log
Return to the Build Page
Add a Comment to the Log

Build Error Summary

Build Error Log


tinderbox: tree: NSS
tinderbox: builddate: 1354065778
tinderbox: status: testfailed
tinderbox: build: trunk standard nss-vm-darwin9-1 Darwin 32bit OPT
tinderbox: errorparser: unix
tinderbox: buildfamily: unix
tinderbox: END

TB [2012-11-27 17:22:58] ######## Environment variables ########
Darwin nss-vm-darwin9-1.community.scl3.mozilla.com 9.8.0 Darwin Kernel Version 9.8.0: Wed Jul 15 16:55:01 PDT 2009; root:xnu-1228.15.4~1/RELEASE_I386 i386
MANPATH=/usr/share/man:/usr/local/share/man:/usr/X11/man
TERM=screen
SHELL=/bin/bash
SSH_CLIENT=63.245.223.8 60194 22
TMPDIR=/var/folders/xI/xIC0B4IuFPqdbRB1Iw-4Yk+++TM/-Tmp-/
PORT_JSSE_SERVER=8586
PKITS_DATA=/Users/tinderbox/pkits/data/
OLDPWD=/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_stable_32_DBG/mozilla/security/nss/tests
CVS_LIST=mozilla/nsprpub
mozilla/dbm
mozilla/security/dbm
mozilla/security/coreconf
mozilla/security/nss
mozilla/security/jss
-r:NSS_3_11_1_RTM:mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
SSH_TTY=/dev/ttys000
BRANCH=trunk
USER=tinderbox
NSS_ECC_MORE_THAN_SUITE_B=1
TERMCAP=SC|screen|VT 100/ANSI X3.64 virtual terminal:\
:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:UP=\E[%dA:bs:bt=\E[Z:\
:cd=\E[J:ce=\E[K:cl=\E[H\E[J:cm=\E[%i%d;%dH:ct=\E[3g:\
:do=^J:nd=\E[C:pt:rc=\E8:rs=\Ec:sc=\E7:st=\EH:up=\EM:\
:le=^H:bl=^G:cr=^M:it#8:ho=\E[H:nw=\EE:ta=^I:is=\E)0:\
:li#84:co#272:am:xn:xv:LP:sr=\EM:al=\E[L:AL=\E[%dL:\
:cs=\E[%i%d;%dr:dl=\E[M:DL=\E[%dM:dc=\E[P:DC=\E[%dP:\
:im=\E[4h:ei=\E[4l:mi:IC=\E[%d@:ks=\E[?1h\E=:\
:ke=\E[?1l\E>:vi=\E[?25l:ve=\E[34h\E[?25h:vs=\E[34l:\
:ti=\E[?1049h:te=\E[?1049l:us=\E[4m:ue=\E[24m:so=\E[3m:\
:se=\E[23m:mb=\E[5m:md=\E[1m:mr=\E[7m:me=\E[m:ms:\
:Co#8:pa#64:AF=\E[3%dm:AB=\E[4%dm:op=\E[39;49m:AX:\
:vb=\Eg:G0:as=\E(0:ae=\E(B:\
:ac=\140\140aaffggjjkkllmmnnooppqqrrssttuuvvwwxxyyzz{{||}}~~..--++,,hhII00:\
:po=\E[5i:pf=\E[4i:k0=\E[10~:k1=\EOP:k2=\EOQ:k3=\EOR:\
:k4=\EOS:k5=\E[15~:k6=\E[17~:k7=\E[18~:k8=\E[19~:\
:k9=\E[20~:k;=\E[21~:F1=\E[23~:F2=\E[24~:F3=\EO2P:\
:F4=\EO2Q:F5=\EO2R:F6=\EO2S:F7=\E[15;2~:F8=\E[17;2~:\
:F9=\E[18;2~:FA=\E[19;2~:kb=^H:K2=\EOE:kB=\E[Z:\
:*4=\E[3;2~:*7=\E[1;2F:#2=\E[1;2H:#3=\E[2;2~:#4=\E[1;2D:\
:%c=\E[6;2~:%e=\E[5;2~:%i=\E[1;2C:kh=\E[1~:@1=\E[1~:\
:kH=\E[4~:@7=\E[4~:kN=\E[6~:kP=\E[5~:kI=\E[2~:kD=\E[3~:\
:ku=\EOA:kd=\EOB:kr=\EOC:kl=\EOD:km:
__CF_USER_TEXT_ENCODING=0x1F6:0:0
PATH=/opt/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin:/usr/X11/bin
STY=21755.ttys000.nss-vm-darwin9-1
NSS_ENABLE_ECC=1
PWD=/Users/tinderbox/mozilla/security/tinderlight
JAVA_HOME=
SHLVL=5
HOME=/Users/tinderbox
NSPR_LOG_MODULES=pkix:1
TB_TREE=NSS
USE_64=
LOGNAME=tinderbox
WINDOW=0
SSH_CONNECTION=63.245.223.8 60194 63.245.223.21 22
BUILD_OPT=1
PORT=8546
PORT_JSS_SERVER=8566
_=/usr/bin/env
TB [2012-11-27 17:22:58] ######## CVS checkout ########
TB [2012-11-27 17:22:58] $ cd /Users/tinderbox/mozilla/security/tinderlight/data/mozilla-cvs-trunk
TB [2012-11-27 17:22:58] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/nsprpub
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
cvs checkout: Updating mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub/admin
cvs checkout: Updating mozilla/nsprpub/build
cvs checkout: Updating mozilla/nsprpub/build/autoconf
cvs checkout: Updating mozilla/nsprpub/build/win32
cvs checkout: Updating mozilla/nsprpub/config
cvs checkout: Updating mozilla/nsprpub/include
cvs checkout: Updating mozilla/nsprpub/lib
cvs checkout: Updating mozilla/nsprpub/lib/ds
cvs checkout: Updating mozilla/nsprpub/lib/libc
cvs checkout: Updating mozilla/nsprpub/lib/libc/include
cvs checkout: Updating mozilla/nsprpub/lib/libc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc
cvs checkout: Updating mozilla/nsprpub/lib/msgc/include
cvs checkout: Updating mozilla/nsprpub/lib/msgc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests/testprstrm
cvs checkout: Updating mozilla/nsprpub/lib/tests
cvs checkout: Updating mozilla/nsprpub/lib/tests/windows
cvs checkout: Updating mozilla/nsprpub/macbuild
cvs checkout: Updating mozilla/nsprpub/pkg
cvs checkout: Updating mozilla/nsprpub/pkg/linux
cvs checkout: Updating mozilla/nsprpub/pkg/solaris
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnspr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnsprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprd
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprdx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/common_files
cvs checkout: Updating mozilla/nsprpub/pr
cvs checkout: Updating mozilla/nsprpub/pr/include
cvs checkout: Updating mozilla/nsprpub/pr/include/md
cvs checkout: Updating mozilla/nsprpub/pr/include/obsolete
cvs checkout: Updating mozilla/nsprpub/pr/include/private
cvs checkout: Updating mozilla/nsprpub/pr/src
cvs checkout: Updating mozilla/nsprpub/pr/src/bthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus/tests
cvs checkout: Updating mozilla/nsprpub/pr/src/cthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/io
cvs checkout: Updating mozilla/nsprpub/pr/src/linking
cvs checkout: Updating mozilla/nsprpub/pr/src/malloc
cvs checkout: Updating mozilla/nsprpub/pr/src/md
cvs checkout: Updating mozilla/nsprpub/pr/src/md/beos
cvs checkout: Updating mozilla/nsprpub/pr/src/md/mac
cvs checkout: Updating mozilla/nsprpub/pr/src/md/os2
cvs checkout: Updating mozilla/nsprpub/pr/src/md/unix
cvs checkout: Updating mozilla/nsprpub/pr/src/md/windows
cvs checkout: Updating mozilla/nsprpub/pr/src/memory
cvs checkout: Updating mozilla/nsprpub/pr/src/misc
cvs checkout: Updating mozilla/nsprpub/pr/src/pthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads/combined
cvs checkout: Updating mozilla/nsprpub/pr/tests
cvs checkout: Updating mozilla/nsprpub/pr/tests/dll
cvs checkout: Updating mozilla/nsprpub/pr/tests/macbuild
cvs checkout: Updating mozilla/nsprpub/pr/tests/w16gui
cvs checkout: Updating mozilla/nsprpub/tools
TB [2012-11-27 17:22:59] CVS checkout mozilla/nsprpub PASSED
TB [2012-11-27 17:22:59] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/dbm
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
cvs checkout: Updating mozilla/dbm
cvs checkout: Updating mozilla/dbm/include
cvs checkout: Updating mozilla/dbm/macbuild
cvs checkout: Updating mozilla/dbm/src
cvs checkout: Updating mozilla/dbm/tests
TB [2012-11-27 17:22:59] CVS checkout mozilla/dbm PASSED
TB [2012-11-27 17:22:59] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/dbm
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
cvs checkout: Updating mozilla/security/dbm
U mozilla/security/dbm/Makefile
cvs checkout: Updating mozilla/security/dbm/config
cvs checkout: Updating mozilla/security/dbm/include
cvs checkout: Updating mozilla/security/dbm/src
cvs checkout: Updating mozilla/security/dbm/tests
TB [2012-11-27 17:23:00] CVS checkout mozilla/security/dbm PASSED
TB [2012-11-27 17:23:00] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/coreconf
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
cvs checkout: Updating mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf/mkdepend
cvs checkout: Updating mozilla/security/coreconf/nsinstall
TB [2012-11-27 17:23:00] CVS checkout mozilla/security/coreconf PASSED
TB [2012-11-27 17:23:00] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/nss
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
cvs checkout: Updating mozilla/security/nss
cvs checkout: Updating mozilla/security/nss/build
cvs checkout: Updating mozilla/security/nss/build/autoconf
cvs checkout: Updating mozilla/security/nss/build/unix
cvs checkout: Updating mozilla/security/nss/cmd
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/client
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/server
cvs checkout: Updating mozilla/security/nss/cmd/addbuiltin
cvs checkout: Updating mozilla/security/nss/cmd/atob
cvs checkout: Updating mozilla/security/nss/cmd/bltest
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cfb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ctr
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cts
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_gcm
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/dsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/ecdsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md2
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md5
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc4
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha1
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha224
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha256
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha384
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha512
cvs checkout: Updating mozilla/security/nss/cmd/btoa
cvs checkout: Updating mozilla/security/nss/cmd/certcgi
cvs checkout: Updating mozilla/security/nss/cmd/certutil
cvs checkout: Updating mozilla/security/nss/cmd/cgi
cvs checkout: Updating mozilla/security/nss/cmd/checkcert
cvs checkout: Updating mozilla/security/nss/cmd/chktest
cvs checkout: Updating mozilla/security/nss/cmd/cipher
cvs checkout: Updating mozilla/security/nss/cmd/cmdlib
cvs checkout: Updating mozilla/security/nss/cmd/crlutil
cvs checkout: Updating mozilla/security/nss/cmd/crmf-cgi
cvs checkout: Updating mozilla/security/nss/cmd/crmftest
cvs checkout: Updating mozilla/security/nss/cmd/dbck
cvs checkout: Updating mozilla/security/nss/cmd/dbdump
cvs checkout: Updating mozilla/security/nss/cmd/dbtest
cvs checkout: Updating mozilla/security/nss/cmd/derdump
cvs checkout: Updating mozilla/security/nss/cmd/digest
cvs checkout: Updating mozilla/security/nss/cmd/doc
cvs checkout: Updating mozilla/security/nss/cmd/ecperf
cvs checkout: Updating mozilla/security/nss/cmd/fipstest
cvs checkout: Updating mozilla/security/nss/cmd/httpserv
cvs checkout: Updating mozilla/security/nss/cmd/ilock
cvs checkout: Updating mozilla/security/nss/cmd/include
cvs checkout: Updating mozilla/security/nss/cmd/keyutil
cvs checkout: Updating mozilla/security/nss/cmd/lib
cvs checkout: Updating mozilla/security/nss/cmd/libpkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/libpkix_buildthreads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/nss_threads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/certselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/comcertselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/comcrlselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/crlselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/buildparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/procparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/trustanchor
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/valparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/buildresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/policynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/valresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/verifynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/basicchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/bc_checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_partialchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_uchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/customcrlchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/defaultcrlchecker2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/ocspchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/policychecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/subjaltnamechecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_NB
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_bc
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/certchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/error
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/logger
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/colcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/ekuchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/httpcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/pk11certstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/socket
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/authorityinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/cert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/certdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crlentry
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/date
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/generalname
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/issuingdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/nameconstraints
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/subjectinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/x500name
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bigint
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bytearray
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/hashtable
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mem
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/monitorlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex3
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/object
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/oid
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/rwlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/stress
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkixutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/build_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcrl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/validate_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testwrapper
cvs checkout: Updating mozilla/security/nss/cmd/listsuites
cvs checkout: Updating mozilla/security/nss/cmd/lowhashtest
cvs checkout: Updating mozilla/security/nss/cmd/makepqg
cvs checkout: Updating mozilla/security/nss/cmd/modutil
cvs checkout: Updating mozilla/security/nss/cmd/multinit
cvs checkout: Updating mozilla/security/nss/cmd/nssutil
cvs checkout: Updating mozilla/security/nss/cmd/ocspclnt
cvs checkout: Updating mozilla/security/nss/cmd/ocspresp
cvs checkout: Updating mozilla/security/nss/cmd/oidcalc
cvs checkout: Updating mozilla/security/nss/cmd/p7content
cvs checkout: Updating mozilla/security/nss/cmd/p7env
cvs checkout: Updating mozilla/security/nss/cmd/p7sign
cvs checkout: Updating mozilla/security/nss/cmd/p7verify
cvs checkout: Updating mozilla/security/nss/cmd/pemtest
cvs checkout: Updating mozilla/security/nss/cmd/pemtests
cvs checkout: Updating mozilla/security/nss/cmd/pemutil
cvs checkout: Updating mozilla/security/nss/cmd/pk11info
cvs checkout: Updating mozilla/security/nss/cmd/pk11mode
cvs checkout: Updating mozilla/security/nss/cmd/pk11util
cvs checkout: Updating mozilla/security/nss/cmd/pk11util/scripts
cvs checkout: Updating mozilla/security/nss/cmd/pk12util
cvs checkout: Updating mozilla/security/nss/cmd/pk1sign
cvs checkout: Updating mozilla/security/nss/cmd/pkiutil
cvs checkout: Updating mozilla/security/nss/cmd/pkix-errcodes
cvs checkout: Updating mozilla/security/nss/cmd/pp
cvs checkout: Updating mozilla/security/nss/cmd/ppcertdata
cvs checkout: Updating mozilla/security/nss/cmd/preenc
cvs checkout: Updating mozilla/security/nss/cmd/psmmsgs
cvs checkout: Updating mozilla/security/nss/cmd/pwdecrypt
cvs checkout: Updating mozilla/security/nss/cmd/regress
cvs checkout: Updating mozilla/security/nss/cmd/replacer
cvs checkout: Updating mozilla/security/nss/cmd/reporter
cvs checkout: Updating mozilla/security/nss/cmd/reporter/tests
cvs checkout: Updating mozilla/security/nss/cmd/revoker
cvs checkout: Updating mozilla/security/nss/cmd/rsaperf
cvs checkout: Updating mozilla/security/nss/cmd/rsaperflo
cvs checkout: Updating mozilla/security/nss/cmd/rsapoptst
cvs checkout: Updating mozilla/security/nss/cmd/samples
cvs checkout: Updating mozilla/security/nss/cmd/sdrtest
cvs checkout: Updating mozilla/security/nss/cmd/selfserv
cvs checkout: Updating mozilla/security/nss/cmd/shexp
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign/mangle
cvs checkout: Updating mozilla/security/nss/cmd/signtool
cvs checkout: Updating mozilla/security/nss/cmd/signver
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples/1
cvs checkout: Updating mozilla/security/nss/cmd/smimetools
cvs checkout: Updating mozilla/security/nss/cmd/sslstrength
cvs checkout: Updating mozilla/security/nss/cmd/ssltap
cvs checkout: Updating mozilla/security/nss/cmd/stopselfserv
cvs checkout: Updating mozilla/security/nss/cmd/strsclnt
cvs checkout: Updating mozilla/security/nss/cmd/swfort
cvs checkout: Updating mozilla/security/nss/cmd/swfort/instinit
cvs checkout: Updating mozilla/security/nss/cmd/swfort/newuser
cvs checkout: Updating mozilla/security/nss/cmd/symkeyutil
cvs checkout: Updating mozilla/security/nss/cmd/sysinit
cvs checkout: Updating mozilla/security/nss/cmd/tests
cvs checkout: Updating mozilla/security/nss/cmd/tstclnt
cvs checkout: Updating mozilla/security/nss/cmd/ttformat
cvs checkout: Updating mozilla/security/nss/cmd/vfychain
cvs checkout: Updating mozilla/security/nss/cmd/vfyserv
cvs checkout: Updating mozilla/security/nss/cmd/zlib
cvs checkout: Updating mozilla/security/nss/coverage
cvs checkout: Updating mozilla/security/nss/lib
cvs checkout: Updating mozilla/security/nss/lib/asn1
cvs checkout: Updating mozilla/security/nss/lib/base
cvs checkout: Updating mozilla/security/nss/lib/certdb
cvs checkout: Updating mozilla/security/nss/lib/certhigh
cvs checkout: Updating mozilla/security/nss/lib/ckfw
cvs checkout: Updating mozilla/security/nss/lib/ckfw/builtins
cvs checkout: Updating mozilla/security/nss/lib/ckfw/capi
cvs checkout: Updating mozilla/security/nss/lib/ckfw/dbm
cvs checkout: Updating mozilla/security/nss/lib/ckfw/nssmkey
cvs checkout: Updating mozilla/security/nss/lib/ckfw/pem
cvs checkout: Updating mozilla/security/nss/lib/crmf
cvs checkout: Updating mozilla/security/nss/lib/cryptohi
U mozilla/security/nss/lib/cryptohi/seckey.c
cvs checkout: Updating mozilla/security/nss/lib/dev
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/libci
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort/pkcs11
cvs checkout: Updating mozilla/security/nss/lib/freebl
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/doc
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/utils
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/demo
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/mtest
cvs checkout: Updating mozilla/security/nss/lib/hash
cvs checkout: Updating mozilla/security/nss/lib/jar
cvs checkout: Updating mozilla/security/nss/lib/libpkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/include
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/module
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_i86pc_gcc_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/system
cvs checkout: Updating mozilla/security/nss/lib/macbuild
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS/NSS
cvs checkout: Updating mozilla/security/nss/lib/nss
cvs checkout: Updating mozilla/security/nss/lib/pk11wrap
cvs checkout: Updating mozilla/security/nss/lib/pkcs12
cvs checkout: Updating mozilla/security/nss/lib/pkcs7
cvs checkout: Updating mozilla/security/nss/lib/pki
cvs checkout: Updating mozilla/security/nss/lib/pki/doc
cvs checkout: Updating mozilla/security/nss/lib/pki1
cvs checkout: Updating mozilla/security/nss/lib/pkix
cvs checkout: Updating mozilla/security/nss/lib/pkix/doc
cvs checkout: Updating mozilla/security/nss/lib/pkix/include
cvs checkout: Updating mozilla/security/nss/lib/pkix/src
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AccessDescription
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AdministrationDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AlgorithmIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AnotherName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Attribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AttributeTypeAndValue
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityInfoAccessSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityKeyIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BasicConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInStandardAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CPSuri
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CRLDistPointsSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Certificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificateList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificatePolicies
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DirectoryString
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DisplayText
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPointName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/EDIPartyName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtKeyUsageSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtendedNetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtree
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtrees
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/IssuingDistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/KeyUsage
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NameConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NoticeReference
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NumericUserIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ORAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSParameter
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PhysicalDeliveryCountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Pkcs9email
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyInformation
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyMappings
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyQualifierInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PostalCode
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateKeyUsagePeriod
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RDNSequence
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ReasonFlags
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RelativeDistinguishedName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectDirectoryAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectPublicKeyInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexCommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexPersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TerminalIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Time
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/UserNotice
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Validity
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X121Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520LocalityName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520StateOrProvinceName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Title
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520countryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520dnQualifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/e1634Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/policyMapping
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificates
cvs checkout: Updating mozilla/security/nss/lib/pkix/test
cvs checkout: Updating mozilla/security/nss/lib/rdb
cvs checkout: Updating mozilla/security/nss/lib/smime
cvs checkout: Updating mozilla/security/nss/lib/softoken
U mozilla/security/nss/lib/softoken/Makefile
cvs checkout: Updating mozilla/security/nss/lib/softoken/legacydb
cvs checkout: Updating mozilla/security/nss/lib/sqlite
cvs checkout: Updating mozilla/security/nss/lib/ssl
cvs checkout: Updating mozilla/security/nss/lib/sysinit
cvs checkout: Updating mozilla/security/nss/lib/util
cvs checkout: Updating mozilla/security/nss/lib/zlib
cvs checkout: Updating mozilla/security/nss/lib/zlib/patches
cvs checkout: Updating mozilla/security/nss/macbuild
cvs checkout: Updating mozilla/security/nss/pkg
cvs checkout: Updating mozilla/security/nss/pkg/linux
cvs checkout: Updating mozilla/security/nss/pkg/solaris
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWnss3
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsd
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsdx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsu
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsux
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/nss/ppcertdata
cvs checkout: Updating mozilla/security/nss/tests
cvs checkout: Updating mozilla/security/nss/tests/bltest
cvs checkout: Updating mozilla/security/nss/tests/cert
cvs checkout: Updating mozilla/security/nss/tests/chains
cvs checkout: Updating mozilla/security/nss/tests/chains/ocspd-config
cvs checkout: Updating mozilla/security/nss/tests/chains/scenarios
cvs checkout: Updating mozilla/security/nss/tests/cipher
cvs checkout: Updating mozilla/security/nss/tests/cmdtests
cvs checkout: Updating mozilla/security/nss/tests/common
cvs checkout: Updating mozilla/security/nss/tests/crmf
cvs checkout: Updating mozilla/security/nss/tests/dbtests
cvs checkout: Updating mozilla/security/nss/tests/dbupgrade
cvs checkout: Updating mozilla/security/nss/tests/doc
cvs checkout: Updating mozilla/security/nss/tests/fips
cvs checkout: Updating mozilla/security/nss/tests/iopr
cvs checkout: Updating mozilla/security/nss/tests/iopr/cgi-bin
cvs checkout: Updating mozilla/security/nss/tests/iopr/server_scr
cvs checkout: Updating mozilla/security/nss/tests/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/extKeyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/generalName
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyIdentifier
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/publicKey
cvs checkout: Updating mozilla/security/nss/tests/libpkix/common
cvs checkout: Updating mozilla/security/nss/tests/libpkix/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/system
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/certsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/checker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/crlsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/params
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/results
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/store
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test3
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/util
cvs checkout: Updating mozilla/security/nss/tests/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/tests/lowhash
cvs checkout: Updating mozilla/security/nss/tests/memleak
cvs checkout: Updating mozilla/security/nss/tests/merge
cvs checkout: Updating mozilla/security/nss/tests/multinit
cvs checkout: Updating mozilla/security/nss/tests/ocsp
cvs checkout: Updating mozilla/security/nss/tests/pem
cvs checkout: Updating mozilla/security/nss/tests/perf
cvs checkout: Updating mozilla/security/nss/tests/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl/AIX4.3_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/trivial
cvs checkout: Updating mozilla/security/nss/tests/pkits
cvs checkout: Updating mozilla/security/nss/tests/sdr
cvs checkout: Updating mozilla/security/nss/tests/smime
cvs checkout: Updating mozilla/security/nss/tests/ssl
cvs checkout: Updating mozilla/security/nss/tests/stan
cvs checkout: Updating mozilla/security/nss/tests/stan/client
cvs checkout: Updating mozilla/security/nss/tests/stan/server
cvs checkout: Updating mozilla/security/nss/tests/tools
TB [2012-11-27 17:23:02] CVS checkout mozilla/security/nss PASSED
TB [2012-11-27 17:23:02] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/jss
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
cvs checkout: Updating mozilla/security/jss
cvs checkout: Updating mozilla/security/jss/cmd
cvs checkout: Updating mozilla/security/jss/cmd/jssjava
cvs checkout: Updating mozilla/security/jss/com
cvs checkout: Updating mozilla/security/jss/config
cvs checkout: Updating mozilla/security/jss/lib
cvs checkout: Updating mozilla/security/jss/org
cvs checkout: Updating mozilla/security/jss/org/mozilla
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/SecretDecoderRing
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/asn1
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto_native
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/fips181
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/hclhacks
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/manage
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs10
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs11
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs12
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs7
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cert
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmc
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cms
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/crmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/primitive
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java/security
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/ssl
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/tests
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/util
cvs checkout: Updating mozilla/security/jss/pkg
cvs checkout: Updating mozilla/security/jss/pkg/linux
cvs checkout: Updating mozilla/security/jss/pkg/solaris
cvs checkout: Updating mozilla/security/jss/pkg/solaris/ROOT-SunOS5.8_DBG.OBJ
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss3
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjssx
cvs checkout: Updating mozilla/security/jss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/jss/samples
TB [2012-11-27 17:23:02] CVS checkout mozilla/security/jss PASSED
TB [2012-11-27 17:23:02] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
cvs checkout: warning: failed to open /Users/tinderbox/.cvspass for reading: No such file or directory
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
TB [2012-11-27 17:23:03] CVS checkout -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h PASSED
TB [2012-11-27 17:23:03] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot stat mozilla
TB [2012-11-27 17:23:04] CVS stat mozilla PASSED
-   Repository revision:1.4/cvsroot/mozilla/security/dbm/Makefile,v
+   Repository revision:1.5/cvsroot/mozilla/security/dbm/Makefile,v
-   Repository revision:1.69/cvsroot/mozilla/security/nss/lib/cryptohi/seckey.c,v
+   Repository revision:1.70/cvsroot/mozilla/security/nss/lib/cryptohi/seckey.c,v
-   Repository revision:1.7/cvsroot/mozilla/security/nss/lib/nss/utilwrap.c,v
+   Repository revision:1.8/cvsroot/mozilla/security/nss/lib/nss/utilwrap.c,v
-   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11cxt.c,v
+   Repository revision:1.10/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11cxt.c,v
-   Repository revision:1.28/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11obj.c,v
+   Repository revision:1.29/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11obj.c,v
-   Repository revision:1.41/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11pub.h,v
+   Repository revision:1.42/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11pub.h,v
-   Repository revision:1.29/cvsroot/mozilla/security/nss/lib/pkcs7/p7decode.c,v
+   Repository revision:1.30/cvsroot/mozilla/security/nss/lib/pkcs7/p7decode.c,v
-   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/pkcs7/secpkcs7.h,v
+   Repository revision:1.10/cvsroot/mozilla/security/nss/lib/pkcs7/secpkcs7.h,v
-   Repository revision:1.8/cvsroot/mozilla/security/nss/lib/softoken/Makefile,v
+   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/softoken/Makefile,v
-   Repository revision:1.4/cvsroot/mozilla/security/nss/lib/util/base64.h,v
+   Repository revision:1.5/cvsroot/mozilla/security/nss/lib/util/base64.h,v
-   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/util/nssb64d.c,v
+   Repository revision:1.10/cvsroot/mozilla/security/nss/lib/util/nssb64d.c,v
TB [2012-11-27 17:23:04] CVS change detected
TinderboxPrint:CVS change
TB [2012-11-27 17:23:09] $ cd /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT
TB [2012-11-27 17:23:09] ######## NSS - build - 32 bits - OPT ########
TB [2012-11-27 17:23:09] $ cd /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss
TB [2012-11-27 17:23:09] $ make clean nss_build_all
rm -rf     Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd lib; make clean
rm -rf     Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd util; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnssutil.a Darwin9.8.0_OPT.OBJ/libnssutil3.dylib  Darwin9.8.0_OPT.OBJ/quickder.o Darwin9.8.0_OPT.OBJ/secdig.o Darwin9.8.0_OPT.OBJ/derdec.o Darwin9.8.0_OPT.OBJ/derenc.o Darwin9.8.0_OPT.OBJ/dersubr.o Darwin9.8.0_OPT.OBJ/dertime.o Darwin9.8.0_OPT.OBJ/errstrs.o Darwin9.8.0_OPT.OBJ/nssb64d.o Darwin9.8.0_OPT.OBJ/nssb64e.o Darwin9.8.0_OPT.OBJ/nssrwlk.o Darwin9.8.0_OPT.OBJ/nssilock.o Darwin9.8.0_OPT.OBJ/oidstring.o Darwin9.8.0_OPT.OBJ/portreg.o Darwin9.8.0_OPT.OBJ/secalgid.o Darwin9.8.0_OPT.OBJ/secasn1d.o Darwin9.8.0_OPT.OBJ/secasn1e.o Darwin9.8.0_OPT.OBJ/secasn1u.o Darwin9.8.0_OPT.OBJ/secitem.o Darwin9.8.0_OPT.OBJ/secload.o Darwin9.8.0_OPT.OBJ/secoid.o Darwin9.8.0_OPT.OBJ/sectime.o Darwin9.8.0_OPT.OBJ/secport.o Darwin9.8.0_OPT.OBJ/templates.o Darwin9.8.0_OPT.OBJ/utf8.o Darwin9.8.0_OPT.OBJ/utilmod.o Darwin9.8.0_OPT.OBJ/utilpars.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd freebl; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libfreebl.a Darwin9.8.0_OPT.OBJ/libfreebl3.dylib  Darwin9.8.0_OPT.OBJ/loader.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core   so_locations  Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB 
cd sqlite; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libsqlite.a Darwin9.8.0_OPT.OBJ/libsqlite3.dylib  Darwin9.8.0_OPT.OBJ/sqlite3.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd softoken; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libsoftokn.a Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib  Darwin9.8.0_OPT.OBJ/ecdecode.o Darwin9.8.0_OPT.OBJ/fipsaudt.o Darwin9.8.0_OPT.OBJ/fipstest.o Darwin9.8.0_OPT.OBJ/fipstokn.o Darwin9.8.0_OPT.OBJ/lgglue.o Darwin9.8.0_OPT.OBJ/lowkey.o Darwin9.8.0_OPT.OBJ/lowpbe.o Darwin9.8.0_OPT.OBJ/padbuf.o Darwin9.8.0_OPT.OBJ/pkcs11.o Darwin9.8.0_OPT.OBJ/pkcs11c.o Darwin9.8.0_OPT.OBJ/pkcs11u.o Darwin9.8.0_OPT.OBJ/rsawrapr.o Darwin9.8.0_OPT.OBJ/sdb.o Darwin9.8.0_OPT.OBJ/sftkdb.o Darwin9.8.0_OPT.OBJ/sftkpars.o Darwin9.8.0_OPT.OBJ/sftkpwd.o Darwin9.8.0_OPT.OBJ/softkver.o Darwin9.8.0_OPT.OBJ/tlsprf.o Darwin9.8.0_OPT.OBJ/jpakesftk.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd legacydb; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnssdbm.a Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib  Darwin9.8.0_OPT.OBJ/dbmshim.o Darwin9.8.0_OPT.OBJ/keydb.o Darwin9.8.0_OPT.OBJ/lgattr.o Darwin9.8.0_OPT.OBJ/lgcreate.o Darwin9.8.0_OPT.OBJ/lgdestroy.o Darwin9.8.0_OPT.OBJ/lgfind.o Darwin9.8.0_OPT.OBJ/lginit.o Darwin9.8.0_OPT.OBJ/lgutil.o Darwin9.8.0_OPT.OBJ/lowcert.o Darwin9.8.0_OPT.OBJ/lowkey.o Darwin9.8.0_OPT.OBJ/pcertdb.o Darwin9.8.0_OPT.OBJ/pk11db.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd base; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnssb.a Darwin9.8.0_OPT.OBJ/arena.o Darwin9.8.0_OPT.OBJ/error.o Darwin9.8.0_OPT.OBJ/errorval.o Darwin9.8.0_OPT.OBJ/hashops.o Darwin9.8.0_OPT.OBJ/libc.o Darwin9.8.0_OPT.OBJ/tracker.o Darwin9.8.0_OPT.OBJ/item.o Darwin9.8.0_OPT.OBJ/utf8.o Darwin9.8.0_OPT.OBJ/list.o Darwin9.8.0_OPT.OBJ/hash.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd dev; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnssdev.a Darwin9.8.0_OPT.OBJ/devslot.o Darwin9.8.0_OPT.OBJ/devtoken.o Darwin9.8.0_OPT.OBJ/devutil.o Darwin9.8.0_OPT.OBJ/ckhelper.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pki; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnsspki.a Darwin9.8.0_OPT.OBJ/asymmkey.o Darwin9.8.0_OPT.OBJ/certificate.o Darwin9.8.0_OPT.OBJ/cryptocontext.o Darwin9.8.0_OPT.OBJ/symmkey.o Darwin9.8.0_OPT.OBJ/trustdomain.o Darwin9.8.0_OPT.OBJ/tdcache.o Darwin9.8.0_OPT.OBJ/certdecode.o Darwin9.8.0_OPT.OBJ/pkistore.o Darwin9.8.0_OPT.OBJ/pkibase.o Darwin9.8.0_OPT.OBJ/pki3hack.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd libpkix; make clean
rm -rf   Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd include; make clean
rm -rf   Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pkix; make clean
rm -rf   Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd certsel; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixcertsel.a Darwin9.8.0_OPT.OBJ/pkix_certselector.o Darwin9.8.0_OPT.OBJ/pkix_comcertselparams.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd crlsel; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixcrlsel.a Darwin9.8.0_OPT.OBJ/pkix_crlselector.o Darwin9.8.0_OPT.OBJ/pkix_comcrlselparams.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd checker; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixchecker.a Darwin9.8.0_OPT.OBJ/pkix_basicconstraintschecker.o Darwin9.8.0_OPT.OBJ/pkix_certchainchecker.o Darwin9.8.0_OPT.OBJ/pkix_crlchecker.o Darwin9.8.0_OPT.OBJ/pkix_ekuchecker.o Darwin9.8.0_OPT.OBJ/pkix_expirationchecker.o Darwin9.8.0_OPT.OBJ/pkix_namechainingchecker.o Darwin9.8.0_OPT.OBJ/pkix_nameconstraintschecker.o Darwin9.8.0_OPT.OBJ/pkix_ocspchecker.o Darwin9.8.0_OPT.OBJ/pkix_revocationmethod.o Darwin9.8.0_OPT.OBJ/pkix_revocationchecker.o Darwin9.8.0_OPT.OBJ/pkix_policychecker.o Darwin9.8.0_OPT.OBJ/pkix_signaturechecker.o Darwin9.8.0_OPT.OBJ/pkix_targetcertchecker.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd params; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixparams.a Darwin9.8.0_OPT.OBJ/pkix_trustanchor.o Darwin9.8.0_OPT.OBJ/pkix_procparams.o Darwin9.8.0_OPT.OBJ/pkix_valparams.o Darwin9.8.0_OPT.OBJ/pkix_resourcelimits.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd results; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixresults.a Darwin9.8.0_OPT.OBJ/pkix_buildresult.o Darwin9.8.0_OPT.OBJ/pkix_policynode.o Darwin9.8.0_OPT.OBJ/pkix_valresult.o Darwin9.8.0_OPT.OBJ/pkix_verifynode.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd store; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixstore.a Darwin9.8.0_OPT.OBJ/pkix_store.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd top; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixtop.a Darwin9.8.0_OPT.OBJ/pkix_validate.o Darwin9.8.0_OPT.OBJ/pkix_lifecycle.o Darwin9.8.0_OPT.OBJ/pkix_build.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd util; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixutil.a Darwin9.8.0_OPT.OBJ/pkix_tools.o Darwin9.8.0_OPT.OBJ/pkix_error.o Darwin9.8.0_OPT.OBJ/pkix_logger.o Darwin9.8.0_OPT.OBJ/pkix_list.o Darwin9.8.0_OPT.OBJ/pkix_errpaths.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pkix_pl_nss; make clean
rm -rf   Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pki; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixpki.a Darwin9.8.0_OPT.OBJ/pkix_pl_basicconstraints.o Darwin9.8.0_OPT.OBJ/pkix_pl_cert.o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyinfo.o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicymap.o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyqualifier.o Darwin9.8.0_OPT.OBJ/pkix_pl_crl.o Darwin9.8.0_OPT.OBJ/pkix_pl_crldp.o Darwin9.8.0_OPT.OBJ/pkix_pl_crlentry.o Darwin9.8.0_OPT.OBJ/pkix_pl_date.o Darwin9.8.0_OPT.OBJ/pkix_pl_generalname.o Darwin9.8.0_OPT.OBJ/pkix_pl_infoaccess.o Darwin9.8.0_OPT.OBJ/pkix_pl_nameconstraints.o Darwin9.8.0_OPT.OBJ/pkix_pl_ocsprequest.o Darwin9.8.0_OPT.OBJ/pkix_pl_ocspresponse.o Darwin9.8.0_OPT.OBJ/pkix_pl_publickey.o Darwin9.8.0_OPT.OBJ/pkix_pl_x500name.o Darwin9.8.0_OPT.OBJ/pkix_pl_ocspcertid.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd system; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixsystem.a Darwin9.8.0_OPT.OBJ/pkix_pl_bigint.o Darwin9.8.0_OPT.OBJ/pkix_pl_bytearray.o Darwin9.8.0_OPT.OBJ/pkix_pl_common.o Darwin9.8.0_OPT.OBJ/pkix_pl_error.o Darwin9.8.0_OPT.OBJ/pkix_pl_hashtable.o Darwin9.8.0_OPT.OBJ/pkix_pl_lifecycle.o Darwin9.8.0_OPT.OBJ/pkix_pl_mem.o Darwin9.8.0_OPT.OBJ/pkix_pl_monitorlock.o Darwin9.8.0_OPT.OBJ/pkix_pl_mutex.o Darwin9.8.0_OPT.OBJ/pkix_pl_object.o Darwin9.8.0_OPT.OBJ/pkix_pl_oid.o Darwin9.8.0_OPT.OBJ/pkix_pl_primhash.o Darwin9.8.0_OPT.OBJ/pkix_pl_rwlock.o Darwin9.8.0_OPT.OBJ/pkix_pl_string.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd module; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkixmodule.a Darwin9.8.0_OPT.OBJ/pkix_pl_aiamgr.o Darwin9.8.0_OPT.OBJ/pkix_pl_colcertstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_httpcertstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_httpdefaultclient.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldaptemplates.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapcertstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapresponse.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldaprequest.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapdefaultclient.o Darwin9.8.0_OPT.OBJ/pkix_pl_nsscontext.o Darwin9.8.0_OPT.OBJ/pkix_pl_pk11certstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_socket.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd certdb; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libcertdb.a Darwin9.8.0_OPT.OBJ/alg1485.o Darwin9.8.0_OPT.OBJ/certdb.o Darwin9.8.0_OPT.OBJ/certv3.o Darwin9.8.0_OPT.OBJ/certxutl.o Darwin9.8.0_OPT.OBJ/crl.o Darwin9.8.0_OPT.OBJ/genname.o Darwin9.8.0_OPT.OBJ/stanpcertdb.o Darwin9.8.0_OPT.OBJ/polcyxtn.o Darwin9.8.0_OPT.OBJ/secname.o Darwin9.8.0_OPT.OBJ/xauthkid.o Darwin9.8.0_OPT.OBJ/xbsconst.o Darwin9.8.0_OPT.OBJ/xconst.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd certhigh; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libcerthi.a Darwin9.8.0_OPT.OBJ/certhtml.o Darwin9.8.0_OPT.OBJ/certreq.o Darwin9.8.0_OPT.OBJ/crlv2.o Darwin9.8.0_OPT.OBJ/ocsp.o Darwin9.8.0_OPT.OBJ/ocspsig.o Darwin9.8.0_OPT.OBJ/certhigh.o Darwin9.8.0_OPT.OBJ/certvfy.o Darwin9.8.0_OPT.OBJ/certvfypkix.o Darwin9.8.0_OPT.OBJ/certvfypkixprint.o Darwin9.8.0_OPT.OBJ/xcrldist.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pk11wrap; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpk11wrap.a Darwin9.8.0_OPT.OBJ/dev3hack.o Darwin9.8.0_OPT.OBJ/pk11akey.o Darwin9.8.0_OPT.OBJ/pk11auth.o Darwin9.8.0_OPT.OBJ/pk11cert.o Darwin9.8.0_OPT.OBJ/pk11cxt.o Darwin9.8.0_OPT.OBJ/pk11err.o Darwin9.8.0_OPT.OBJ/pk11kea.o Darwin9.8.0_OPT.OBJ/pk11list.o Darwin9.8.0_OPT.OBJ/pk11load.o Darwin9.8.0_OPT.OBJ/pk11mech.o Darwin9.8.0_OPT.OBJ/pk11merge.o Darwin9.8.0_OPT.OBJ/pk11nobj.o Darwin9.8.0_OPT.OBJ/pk11obj.o Darwin9.8.0_OPT.OBJ/pk11pars.o Darwin9.8.0_OPT.OBJ/pk11pbe.o Darwin9.8.0_OPT.OBJ/pk11pk12.o Darwin9.8.0_OPT.OBJ/pk11pqg.o Darwin9.8.0_OPT.OBJ/pk11sdr.o Darwin9.8.0_OPT.OBJ/pk11skey.o Darwin9.8.0_OPT.OBJ/pk11slot.o Darwin9.8.0_OPT.OBJ/pk11util.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd cryptohi; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libcryptohi.a Darwin9.8.0_OPT.OBJ/sechash.o Darwin9.8.0_OPT.OBJ/seckey.o Darwin9.8.0_OPT.OBJ/secsign.o Darwin9.8.0_OPT.OBJ/secvfy.o Darwin9.8.0_OPT.OBJ/dsautil.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd nss; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnss.a Darwin9.8.0_OPT.OBJ/libnss3.dylib  Darwin9.8.0_OPT.OBJ/nssinit.o Darwin9.8.0_OPT.OBJ/nssver.o Darwin9.8.0_OPT.OBJ/utilwrap.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd ssl; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libssl.a Darwin9.8.0_OPT.OBJ/libssl3.dylib  Darwin9.8.0_OPT.OBJ/derive.o Darwin9.8.0_OPT.OBJ/dtlscon.o Darwin9.8.0_OPT.OBJ/prelib.o Darwin9.8.0_OPT.OBJ/ssl3con.o Darwin9.8.0_OPT.OBJ/ssl3gthr.o Darwin9.8.0_OPT.OBJ/sslauth.o Darwin9.8.0_OPT.OBJ/sslcon.o Darwin9.8.0_OPT.OBJ/ssldef.o Darwin9.8.0_OPT.OBJ/sslenum.o Darwin9.8.0_OPT.OBJ/sslerr.o Darwin9.8.0_OPT.OBJ/sslerrstrs.o Darwin9.8.0_OPT.OBJ/sslinit.o Darwin9.8.0_OPT.OBJ/ssl3ext.o Darwin9.8.0_OPT.OBJ/sslgathr.o Darwin9.8.0_OPT.OBJ/sslmutex.o Darwin9.8.0_OPT.OBJ/sslnonce.o Darwin9.8.0_OPT.OBJ/sslreveal.o Darwin9.8.0_OPT.OBJ/sslsecur.o Darwin9.8.0_OPT.OBJ/sslsnce.o Darwin9.8.0_OPT.OBJ/sslsock.o Darwin9.8.0_OPT.OBJ/ssltrace.o Darwin9.8.0_OPT.OBJ/sslver.o Darwin9.8.0_OPT.OBJ/authcert.o Darwin9.8.0_OPT.OBJ/cmpcert.o Darwin9.8.0_OPT.OBJ/sslinfo.o Darwin9.8.0_OPT.OBJ/ssl3ecc.o Darwin9.8.0_OPT.OBJ/unix_err.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pkcs12; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkcs12.a Darwin9.8.0_OPT.OBJ/p12local.o Darwin9.8.0_OPT.OBJ/p12creat.o Darwin9.8.0_OPT.OBJ/p12dec.o Darwin9.8.0_OPT.OBJ/p12plcy.o Darwin9.8.0_OPT.OBJ/p12tmpl.o Darwin9.8.0_OPT.OBJ/p12e.o Darwin9.8.0_OPT.OBJ/p12d.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pkcs7; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libpkcs7.a Darwin9.8.0_OPT.OBJ/certread.o Darwin9.8.0_OPT.OBJ/p7common.o Darwin9.8.0_OPT.OBJ/p7create.o Darwin9.8.0_OPT.OBJ/p7decode.o Darwin9.8.0_OPT.OBJ/p7encode.o Darwin9.8.0_OPT.OBJ/p7local.o Darwin9.8.0_OPT.OBJ/secmime.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd smime; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libsmime.a Darwin9.8.0_OPT.OBJ/libsmime3.dylib  Darwin9.8.0_OPT.OBJ/cmsarray.o Darwin9.8.0_OPT.OBJ/cmsasn1.o Darwin9.8.0_OPT.OBJ/cmsattr.o Darwin9.8.0_OPT.OBJ/cmscinfo.o Darwin9.8.0_OPT.OBJ/cmscipher.o Darwin9.8.0_OPT.OBJ/cmsdecode.o Darwin9.8.0_OPT.OBJ/cmsdigdata.o Darwin9.8.0_OPT.OBJ/cmsdigest.o Darwin9.8.0_OPT.OBJ/cmsencdata.o Darwin9.8.0_OPT.OBJ/cmsencode.o Darwin9.8.0_OPT.OBJ/cmsenvdata.o Darwin9.8.0_OPT.OBJ/cmsmessage.o Darwin9.8.0_OPT.OBJ/cmspubkey.o Darwin9.8.0_OPT.OBJ/cmsrecinfo.o Darwin9.8.0_OPT.OBJ/cmsreclist.o Darwin9.8.0_OPT.OBJ/cmssigdata.o Darwin9.8.0_OPT.OBJ/cmssiginfo.o Darwin9.8.0_OPT.OBJ/cmsudf.o Darwin9.8.0_OPT.OBJ/cmsutil.o Darwin9.8.0_OPT.OBJ/smimemessage.o Darwin9.8.0_OPT.OBJ/smimeutil.o Darwin9.8.0_OPT.OBJ/smimever.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd crmf; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libcrmf.a Darwin9.8.0_OPT.OBJ/crmfenc.o Darwin9.8.0_OPT.OBJ/crmftmpl.o Darwin9.8.0_OPT.OBJ/crmfreq.o Darwin9.8.0_OPT.OBJ/crmfpop.o Darwin9.8.0_OPT.OBJ/crmfdec.o Darwin9.8.0_OPT.OBJ/crmfget.o Darwin9.8.0_OPT.OBJ/crmfcont.o Darwin9.8.0_OPT.OBJ/cmmfasn1.o Darwin9.8.0_OPT.OBJ/cmmfresp.o Darwin9.8.0_OPT.OBJ/cmmfrec.o Darwin9.8.0_OPT.OBJ/cmmfchal.o Darwin9.8.0_OPT.OBJ/servget.o Darwin9.8.0_OPT.OBJ/encutil.o Darwin9.8.0_OPT.OBJ/respcli.o Darwin9.8.0_OPT.OBJ/respcmn.o Darwin9.8.0_OPT.OBJ/challcli.o Darwin9.8.0_OPT.OBJ/asn1cmn.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd jar; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libjar.a Darwin9.8.0_OPT.OBJ/jarver.o Darwin9.8.0_OPT.OBJ/jarsign.o Darwin9.8.0_OPT.OBJ/jar.o Darwin9.8.0_OPT.OBJ/jar-ds.o Darwin9.8.0_OPT.OBJ/jarfile.o Darwin9.8.0_OPT.OBJ/jarint.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd ckfw; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnssckfw.a Darwin9.8.0_OPT.OBJ/crypto.o Darwin9.8.0_OPT.OBJ/find.o Darwin9.8.0_OPT.OBJ/hash.o Darwin9.8.0_OPT.OBJ/instance.o Darwin9.8.0_OPT.OBJ/mutex.o Darwin9.8.0_OPT.OBJ/object.o Darwin9.8.0_OPT.OBJ/session.o Darwin9.8.0_OPT.OBJ/sessobj.o Darwin9.8.0_OPT.OBJ/slot.o Darwin9.8.0_OPT.OBJ/token.o Darwin9.8.0_OPT.OBJ/wrap.o Darwin9.8.0_OPT.OBJ/mechanism.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd builtins; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libnssckbi.dylib Darwin9.8.0_OPT.OBJ/anchor.o Darwin9.8.0_OPT.OBJ/constants.o Darwin9.8.0_OPT.OBJ/bfind.o Darwin9.8.0_OPT.OBJ/binst.o Darwin9.8.0_OPT.OBJ/bobject.o Darwin9.8.0_OPT.OBJ/bsession.o Darwin9.8.0_OPT.OBJ/bslot.o Darwin9.8.0_OPT.OBJ/btoken.o Darwin9.8.0_OPT.OBJ/certdata.o Darwin9.8.0_OPT.OBJ/ckbiver.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd cmd; make clean
rm -rf     Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd lib; make clean
rm -rf Darwin9.8.0_OPT.OBJ/libsectool.a Darwin9.8.0_OPT.OBJ/basicutil.o Darwin9.8.0_OPT.OBJ/secutil.o Darwin9.8.0_OPT.OBJ/secpwd.o Darwin9.8.0_OPT.OBJ/derprint.o Darwin9.8.0_OPT.OBJ/moreoids.o Darwin9.8.0_OPT.OBJ/pppolicy.o Darwin9.8.0_OPT.OBJ/ffs.o Darwin9.8.0_OPT.OBJ/pk11table.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd addbuiltin; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/addbuiltin Darwin9.8.0_OPT.OBJ/addbuiltin.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd atob; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/atob Darwin9.8.0_OPT.OBJ/atob.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd bltest; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/bltest Darwin9.8.0_OPT.OBJ/blapitest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd btoa; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/btoa Darwin9.8.0_OPT.OBJ/btoa.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd certcgi; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/certcgi Darwin9.8.0_OPT.OBJ/certcgi.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd certutil; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/certutil Darwin9.8.0_OPT.OBJ/certext.o Darwin9.8.0_OPT.OBJ/certutil.o Darwin9.8.0_OPT.OBJ/keystuff.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd checkcert; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/checkcert Darwin9.8.0_OPT.OBJ/checkcert.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd chktest; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/chktest Darwin9.8.0_OPT.OBJ/chktest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd crlutil; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/crlutil Darwin9.8.0_OPT.OBJ/crlgen_lex.o Darwin9.8.0_OPT.OBJ/crlgen.o Darwin9.8.0_OPT.OBJ/crlutil.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd crmftest; make clean
rm -rf Darwin9.8.0_OPT.OBJ/crmftest Darwin9.8.0_OPT.OBJ/testcrmf.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd dbtest; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/dbtest Darwin9.8.0_OPT.OBJ/dbtest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd derdump; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/derdump Darwin9.8.0_OPT.OBJ/derdump.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd digest; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/digest Darwin9.8.0_OPT.OBJ/digest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd httpserv; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/httpserv Darwin9.8.0_OPT.OBJ/httpserv.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd fipstest; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/fipstest Darwin9.8.0_OPT.OBJ/fipstest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd listsuites; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/listsuites Darwin9.8.0_OPT.OBJ/listsuites.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd makepqg; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/makepqg Darwin9.8.0_OPT.OBJ/makepqg.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd multinit; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/multinit Darwin9.8.0_OPT.OBJ/multinit.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd ocspclnt; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/ocspclnt Darwin9.8.0_OPT.OBJ/ocspclnt.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd ocspresp; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/ocspresp Darwin9.8.0_OPT.OBJ/ocspresp.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd oidcalc; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/oidcalc Darwin9.8.0_OPT.OBJ/oidcalc.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd p7content; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/p7content Darwin9.8.0_OPT.OBJ/p7content.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd p7env; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/p7env Darwin9.8.0_OPT.OBJ/p7env.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd p7sign; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/p7sign Darwin9.8.0_OPT.OBJ/p7sign.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd p7verify; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/p7verify Darwin9.8.0_OPT.OBJ/p7verify.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pk12util; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/pk12util Darwin9.8.0_OPT.OBJ/pk12util.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pk11mode; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/pk11mode Darwin9.8.0_OPT.OBJ/pk11mode.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pk1sign; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/pk1sign Darwin9.8.0_OPT.OBJ/pk1sign.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pkix-errcodes; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/pkix-errcodes Darwin9.8.0_OPT.OBJ/pkix-errcodes.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pp; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/pp Darwin9.8.0_OPT.OBJ/pp.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd pwdecrypt; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/pwdecrypt Darwin9.8.0_OPT.OBJ/pwdecrypt.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd rsaperf; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/rsaperf Darwin9.8.0_OPT.OBJ/rsaperf.o Darwin9.8.0_OPT.OBJ/defkey.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd sdrtest; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/sdrtest Darwin9.8.0_OPT.OBJ/sdrtest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd selfserv; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/selfserv Darwin9.8.0_OPT.OBJ/selfserv.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd signtool; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/signtool Darwin9.8.0_OPT.OBJ/signtool.o Darwin9.8.0_OPT.OBJ/certgen.o Darwin9.8.0_OPT.OBJ/javascript.o Darwin9.8.0_OPT.OBJ/list.o Darwin9.8.0_OPT.OBJ/sign.o Darwin9.8.0_OPT.OBJ/util.o Darwin9.8.0_OPT.OBJ/verify.o Darwin9.8.0_OPT.OBJ/zip.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd signver; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/signver Darwin9.8.0_OPT.OBJ/signver.o Darwin9.8.0_OPT.OBJ/pk7print.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd shlibsign; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/shlibsign Darwin9.8.0_OPT.OBJ/shlibsign.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations   ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.chk ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.chk
cd mangle; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/mangle Darwin9.8.0_OPT.OBJ/mangle.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd smimetools; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/cmsutil Darwin9.8.0_OPT.OBJ/cmsutil.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd ssltap; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/ssltap Darwin9.8.0_OPT.OBJ/ssltap.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd strsclnt; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/strsclnt Darwin9.8.0_OPT.OBJ/strsclnt.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd symkeyutil; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/symkeyutil Darwin9.8.0_OPT.OBJ/symkeyutil.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd tests; make clean
rm -rf Darwin9.8.0_OPT.OBJ/baddbdir Darwin9.8.0_OPT.OBJ/conflict Darwin9.8.0_OPT.OBJ/dertimetest Darwin9.8.0_OPT.OBJ/encodeinttest Darwin9.8.0_OPT.OBJ/nonspr10 Darwin9.8.0_OPT.OBJ/remtest Darwin9.8.0_OPT.OBJ/secmodtest Darwin9.8.0_OPT.OBJ/baddbdir.o Darwin9.8.0_OPT.OBJ/conflict.o Darwin9.8.0_OPT.OBJ/dertimetest.o Darwin9.8.0_OPT.OBJ/encodeinttest.o Darwin9.8.0_OPT.OBJ/nonspr10.o Darwin9.8.0_OPT.OBJ/remtest.o Darwin9.8.0_OPT.OBJ/secmodtest.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd tstclnt; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/tstclnt Darwin9.8.0_OPT.OBJ/tstclnt.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd vfychain; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/vfychain Darwin9.8.0_OPT.OBJ/vfychain.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd vfyserv; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/vfyserv Darwin9.8.0_OPT.OBJ/vfyserv.o Darwin9.8.0_OPT.OBJ/vfyutil.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
cd modutil; make clean
rm -rf   Darwin9.8.0_OPT.OBJ/modutil Darwin9.8.0_OPT.OBJ/modutil.o Darwin9.8.0_OPT.OBJ/pk11.o Darwin9.8.0_OPT.OBJ/instsec.o Darwin9.8.0_OPT.OBJ/install.o Darwin9.8.0_OPT.OBJ/installparse.o Darwin9.8.0_OPT.OBJ/install-ds.o Darwin9.8.0_OPT.OBJ/lex.Pk11Install_yy.o Darwin9.8.0_OPT.OBJ LOGS TAGS Darwin9.8.0_OPT.OBJ/.md core  so_locations  
make -C ../coreconf
cd nsinstall; make export
make[2]: Nothing to be done for `export'.
cd nsinstall; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nsinstall.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  nsinstall.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pathsub.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  pathsub.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nsinstall -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  Darwin9.8.0_OPT.OBJ/nsinstall.o Darwin9.8.0_OPT.OBJ/pathsub.o    
true -m 775 Darwin9.8.0_OPT.OBJ/nsinstall ../../../dist/Darwin9.8.0_OPT.OBJ/bin
../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -D ../../nsprpub/Darwin9.8.0_OPT.OBJ
cd ../../nsprpub/Darwin9.8.0_OPT.OBJ ; \
 sh ../configure \
--disable-debug --enable-optimize \
--with-dist-prefix='/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ' \
--with-dist-includedir='/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include'
creating cache ./config.cache
checking host system type... i386-apple-darwin9.8.0
checking target system type... i386-apple-darwin9.8.0
checking build system type... i386-apple-darwin9.8.0
checking for whoami... /usr/bin/whoami
checking for gcc... gcc
checking whether the C compiler (gcc  ) works... yes
checking whether the C compiler (gcc  ) is a cross-compiler... no
checking whether we are using GNU C... yes
checking whether gcc accepts -g... yes
checking how to run the C preprocessor... gcc -E
checking for ranlib... ranlib
checking for as... /usr/bin/as
checking for ar... /usr/bin/ar
checking for ld... /usr/bin/ld
checking for strip... /usr/bin/strip
checking for windres... no
checking for gcc -pipe support... no
checking whether C compiler supports -fprofile-generate... no
checking for visibility(hidden) attribute... no
checking for perl5... /opt/local/bin/perl5
checking for crt_externs.h... yes
checking whether gcc -arch i386 needs -traditional... no
checking for lchown... yes
checking for strerror... yes
checking for dladdr... yes
checking whether gcc -arch i386 accepts -pthread... yes
updating cache ./config.cache
creating ./config.status
creating Makefile
creating config/Makefile
creating config/autoconf.mk
creating config/nsprincl.mk
creating config/nsprincl.sh
creating config/nspr-config
creating config/nspr.pc
creating lib/Makefile
creating lib/ds/Makefile
creating lib/libc/Makefile
creating lib/libc/include/Makefile
creating lib/libc/src/Makefile
creating lib/tests/Makefile
creating pkg/Makefile
creating pr/Makefile
creating pr/include/Makefile
creating pr/include/md/Makefile
creating pr/include/obsolete/Makefile
creating pr/include/private/Makefile
creating pr/src/Makefile
creating pr/src/io/Makefile
creating pr/src/linking/Makefile
creating pr/src/malloc/Makefile
creating pr/src/md/Makefile
creating pr/src/md/unix/Makefile
creating pr/src/memory/Makefile
creating pr/src/misc/Makefile
creating pr/src/threads/Makefile
creating pr/tests/Makefile
creating pr/tests/dll/Makefile
creating pr/src/pthreads/Makefile
make -C ../../nsprpub/Darwin9.8.0_OPT.OBJ
make -C config export
gcc -arch i386 -o now.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM   ../../config/now.c
gcc -arch i386  now.o   -o now
gcc -arch i386 -o nsinstall.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM   ../../config/nsinstall.c
gcc -arch i386  nsinstall.o   -o nsinstall
rm -f nfspwd; cp ../../config/nfspwd.pl nfspwd; chmod +x nfspwd
rm -f /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/bin/nspr-config
make -C pr export
make -C include export
make -C md export
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_aix32.cfg ../../../../pr/include/md/_aix64.cfg ../../../../pr/include/md/_beos.cfg ../../../../pr/include/md/_bsdi.cfg ../../../../pr/include/md/_darwin.cfg ../../../../pr/include/md/_dgux.cfg ../../../../pr/include/md/_freebsd.cfg ../../../../pr/include/md/_hpux32.cfg ../../../../pr/include/md/_hpux64.cfg ../../../../pr/include/md/_irix32.cfg ../../../../pr/include/md/_irix64.cfg ../../../../pr/include/md/_linux.cfg ../../../../pr/include/md/_netbsd.cfg ../../../../pr/include/md/_nto.cfg ../../../../pr/include/md/_openbsd.cfg ../../../../pr/include/md/_os2.cfg ../../../../pr/include/md/_osf1.cfg ../../../../pr/include/md/_qnx.cfg ../../../../pr/include/md/_riscos.cfg ../../../../pr/include/md/_scoos.cfg ../../../../pr/include/md/_solaris.cfg ../../../../pr/include/md/_symbian.cfg ../../../../pr/include/md/_unixware.cfg ../../../../pr/include/md/_unixware7.cfg ../../../../pr/include/md/_win95.cfg ../../../../pr/include/md/_winnt.cfg /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include/md
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_darwin.cfg /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include
mv -f /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include/_darwin.cfg /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include/prcpucfg.h
make -C private export
../../../config/./nsinstall -R -m 444 ../../../../pr/include/private/pprio.h ../../../../pr/include/private/pprthred.h ../../../../pr/include/private/prpriv.h /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include/private
make -C obsolete export
../../../config/./nsinstall -R -m 444 ../../../../pr/include/obsolete/pralarm.h ../../../../pr/include/obsolete/probslet.h ../../../../pr/include/obsolete/protypes.h ../../../../pr/include/obsolete/prsem.h /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include/obsolete
../../config/./nsinstall -R -m 444 ../../../pr/include/nspr.h ../../../pr/include/pratom.h ../../../pr/include/prbit.h ../../../pr/include/prclist.h ../../../pr/include/prcmon.h ../../../pr/include/prcountr.h ../../../pr/include/prcvar.h ../../../pr/include/prdtoa.h ../../../pr/include/prenv.h ../../../pr/include/prerr.h ../../../pr/include/prerror.h ../../../pr/include/prinet.h ../../../pr/include/prinit.h ../../../pr/include/prinrval.h ../../../pr/include/prio.h ../../../pr/include/pripcsem.h ../../../pr/include/prlink.h ../../../pr/include/prlock.h ../../../pr/include/prlog.h ../../../pr/include/prlong.h ../../../pr/include/prmem.h ../../../pr/include/prmon.h ../../../pr/include/prmwait.h ../../../pr/include/prnetdb.h ../../../pr/include/prolock.h ../../../pr/include/prpdce.h ../../../pr/include/prprf.h ../../../pr/include/prproces.h ../../../pr/include/prrng.h ../../../pr/include/prrwlock.h ../../../pr/include/prshm.h ../../../pr/include/prshma.h ../../../pr/include/prsystem.h ../../../pr/include/prthread.h ../../../pr/include/prtime.h ../../../pr/include/prtpool.h ../../../pr/include/prtrace.h ../../../pr/include/prtypes.h ../../../pr/include/prvrsion.h ../../../pr/include/prwin16.h /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include
make -C src export
make -C io export
gcc -arch i386 -o prfdcach.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prfdcach.c
gcc -arch i386 -o prmwait.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmwait.c
gcc -arch i386 -o priometh.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/priometh.c
gcc -arch i386 -o pripv6.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/pripv6.c
gcc -arch i386 -o prmapopt.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmapopt.c
gcc -arch i386 -o prlayer.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prlayer.c
gcc -arch i386 -o prlog.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prlog.c
gcc -arch i386 -o prmmap.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmmap.c
gcc -arch i386 -o prpolevt.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prpolevt.c
gcc -arch i386 -o prprf.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prprf.c
../../../../pr/src/io/prprf.c: In function 'dosprintf':
../../../../pr/src/io/prprf.c:687: warning: 'nap' may be used uninitialized in this function
gcc -arch i386 -o prscanf.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prscanf.c
../../../../pr/src/io/prscanf.c: In function 'PR_sscanf':
../../../../pr/src/io/prscanf.c:307: warning: 'ch' may be used uninitialized in this function
../../../../pr/src/io/prscanf.c:197: warning: 'ch' may be used uninitialized in this function
gcc -arch i386 -o prstdio.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prstdio.c
make -C linking export
gcc -arch i386 -o prlink.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/linking/prlink.c
../../../../pr/src/linking/prlink.c: In function 'pr_FindSymbolInLib':
../../../../pr/src/linking/prlink.c:1119: warning: 'c2pstrcpy' is deprecated (declared at /System/Library/Frameworks/CoreServices.framework/Frameworks/CarbonCore.framework/Headers/TextUtils.h:578)
make -C malloc export
gcc -arch i386 -o prmalloc.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/malloc/prmalloc.c
gcc -arch i386 -o prmem.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/malloc/prmem.c
make -C md export
make -C unix export
gcc -arch i386 -o unix.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/unix.c
gcc -arch i386 -o unix_errors.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/unix_errors.c
gcc -arch i386 -o uxproces.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxproces.c
gcc -arch i386 -o uxrng.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxrng.c
gcc -arch i386 -o uxshm.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxshm.c
gcc -arch i386 -o uxwrap.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxwrap.c
gcc -arch i386 -o darwin.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/darwin.c
gcc -arch i386 -x assembler-with-cpp -o os_Darwin.o      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  -c ../../../../../pr/src/md/unix/os_Darwin.s
gcc -arch i386 -o prosdep.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include  ../../../../pr/src/md/prosdep.c
make -C memory export
gcc -arch i386 -o prseg.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prseg.c
gcc -arch i386 -o prshm.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prshm.c
gcc -arch i386 -o prshma.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prshma.c
make -C misc export
gcc -arch i386 -o pralarm.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pralarm.c
../../../../pr/src/misc/pralarm.c: In function 'pr_alarmNotifier':
../../../../pr/src/misc/pralarm.c:104: warning: 'pause' may be used uninitialized in this function
gcc -arch i386 -o pratom.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pratom.c
gcc -arch i386 -o prcountr.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prcountr.c
gcc -arch i386 -o prdtoa.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prdtoa.c
../../../../pr/src/misc/prdtoa.c: In function 'mult':
../../../../pr/src/misc/prdtoa.c:878: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:892: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c: In function 'pow5mult':
../../../../pr/src/misc/prdtoa.c:944: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c: In function 'lshift':
../../../../pr/src/misc/prdtoa.c:1025: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c: In function 'b2d':
../../../../pr/src/misc/prdtoa.c:1248: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:1250: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:1250: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:1255: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:1257: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c: In function 'd2b':
../../../../pr/src/misc/prdtoa.c:1333: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:1337: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:1338: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:1339: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c: In function 'PR_strtod':
../../../../pr/src/misc/prdtoa.c:1904: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:1964: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:1983: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c: In function 'nrv_alloc':
../../../../pr/src/misc/prdtoa.c:2649: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c: In function 'dtoa':
../../../../pr/src/misc/prdtoa.c:2831: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:2875: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:2876: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:2876: warning: suggest parentheses around + or - inside shift
../../../../pr/src/misc/prdtoa.c:2985: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:3099: warning: suggest parentheses around && within ||
../../../../pr/src/misc/prdtoa.c:3146: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:3184: warning: suggest parentheses around assignment used as truth value
../../../../pr/src/misc/prdtoa.c:3273: warning: suggest parentheses around && within ||
../../../../pr/src/misc/prdtoa.c:3290: warning: suggest parentheses around && within ||
../../../../pr/src/misc/prdtoa.c:3350: warning: suggest parentheses around && within ||
../../../../pr/src/misc/prdtoa.c: In function 'PR_strtod':
../../../../pr/src/misc/prdtoa.c:1615: warning: 'delta' may be used uninitialized in this function
../../../../pr/src/misc/prdtoa.c:1615: warning: 'bs' may be used uninitialized in this function
../../../../pr/src/misc/prdtoa.c:1615: warning: 'bb' may be used uninitialized in this function
../../../../pr/src/misc/prdtoa.c:1615: warning: 'bd' may be used uninitialized in this function
../../../../pr/src/misc/prdtoa.c: In function 'PR_dtoa':
../../../../pr/src/misc/prdtoa.c:2754: warning: 'ilim' may be used uninitialized in this function
../../../../pr/src/misc/prdtoa.c:2754: warning: 'ilim1' may be used uninitialized in this function
../../../../pr/src/misc/prdtoa.c:2762: warning: 'mlo' may be used uninitialized in this function
gcc -arch i386 -o prenv.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prenv.c
../../../../pr/src/misc/prenv.c: In function 'PR_SetEnv':
../../../../pr/src/misc/prenv.c:64: warning: passing argument 1 of 'putenv' discards qualifiers from pointer target type
gcc -arch i386 -o prerr.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerr.c
gcc -arch i386 -o prerror.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerror.c
gcc -arch i386 -o prerrortable.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerrortable.c
gcc -arch i386 -o prinit.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prinit.c
gcc -arch i386 -o prinrval.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prinrval.c
gcc -arch i386 -o pripc.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pripc.c
gcc -arch i386 -o prlog2.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prlog2.c
gcc -arch i386 -o prlong.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prlong.c
gcc -arch i386 -o prnetdb.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prnetdb.c
../../../../pr/src/misc/prnetdb.c: In function 'PR_StringToNetAddr':
../../../../pr/src/misc/prnetdb.c:1552: warning: 'val' may be used uninitialized in this function
gcc -arch i386 -o praton.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/praton.c
gcc -arch i386 -o prolock.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prolock.c
gcc -arch i386 -o prrng.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prrng.c
gcc -arch i386 -o prsystem.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prsystem.c
gcc -arch i386 -o prtime.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtime.c
gcc -arch i386 -o prthinfo.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prthinfo.c
gcc -arch i386 -o prtpool.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtpool.c
../../../../pr/src/misc/prtpool.c: In function 'io_wstart':
../../../../pr/src/misc/prtpool.c:285: warning: 'polljobs' may be used uninitialized in this function
../../../../pr/src/misc/prtpool.c:284: warning: 'pollfds' may be used uninitialized in this function
gcc -arch i386 -o prtrace.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtrace.c
../../../../pr/src/misc/prtrace.c: In function 'PR_RecordTraceEntries':
../../../../pr/src/misc/prtrace.c:762: warning: 'buf' may be used uninitialized in this function
make -C threads export
gcc -arch i386 -o prcmon.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prcmon.c
gcc -arch i386 -o prrwlock.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prrwlock.c
gcc -arch i386 -o prtpd.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prtpd.c
make -C pthreads export
gcc -arch i386 -o ptio.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptio.c
../../../../pr/src/pthreads/ptio.c: In function '_PR_InitIO':
../../../../pr/src/pthreads/ptio.c:1155: warning: pointer targets in passing argument 5 of 'getsockopt' differ in signedness
../../../../pr/src/pthreads/ptio.c: In function 'pt_Available_f':
../../../../pr/src/pthreads/ptio.c:1453: warning: 'end' may be used uninitialized in this function
../../../../pr/src/pthreads/ptio.c: In function 'pt_Available64_f':
../../../../pr/src/pthreads/ptio.c:1472: warning: 'end' may be used uninitialized in this function
../../../../pr/src/pthreads/ptio.c: In function 'PR_Poll':
../../../../pr/src/pthreads/ptio.c:3766: warning: 'start' may be used uninitialized in this function
../../../../pr/src/pthreads/ptio.c: In function 'PR_Select':
../../../../pr/src/pthreads/ptio.c:4920: warning: 'start' may be used uninitialized in this function
gcc -arch i386 -o ptsynch.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptsynch.c
../../../../pr/src/pthreads/ptsynch.c: In function 'PR_NewCondVar':
../../../../pr/src/pthreads/ptsynch.c:325: warning: unused variable 'rv'
../../../../pr/src/pthreads/ptsynch.c: In function 'PR_DestroyCondVar':
../../../../pr/src/pthreads/ptsynch.c:340: warning: unused variable 'rv'
gcc -arch i386 -o ptthread.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptthread.c
gcc -arch i386 -o ptmisc.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptmisc.c
make build
gcc -arch i386 -o prvrsion.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../pr/include -I../../../pr/include/private  -I. ../../../pr/src/prvrsion.c
rm -f libnspr4.a
/usr/bin/ar cr libnspr4.a ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./darwin.o md/unix/./os_Darwin.o 
ranlib: file: libnspr4.a(pripv6.o) has no symbols
ranlib: file: libnspr4.a(prmalloc.o) has no symbols
ranlib: file: libnspr4.a(uxwrap.o) has no symbols
ranlib libnspr4.a
ranlib: file: libnspr4.a(pripv6.o) has no symbols
ranlib: file: libnspr4.a(prmalloc.o) has no symbols
ranlib: file: libnspr4.a(uxwrap.o) has no symbols
rm -f libnspr4.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -all_load -install_name @executable_path/libnspr4.dylib -headerpad_max_install_names -o libnspr4.dylib ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./darwin.o md/unix/./os_Darwin.o    -framework CoreServices -framework CoreFoundation
../../config/./nsinstall -R -m 444 ./libnspr4.a ./libnspr4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/lib
../../config/./nsinstall -R -m 444 ./libnspr4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/bin
make -C lib export
make -C ds export
gcc -arch i386 -o plarena.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../pr/include  ../../../lib/ds/plarena.c
gcc -arch i386 -o plhash.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../pr/include  ../../../lib/ds/plhash.c
gcc -arch i386 -o plvrsion.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../pr/include  -I. ../../../lib/ds/plvrsion.c
rm -f libplds4.a
/usr/bin/ar cr libplds4.a ./plarena.o ./plhash.o ./plvrsion.o  
ranlib libplds4.a
rm -f libplds4.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -all_load -install_name @executable_path/libplds4.dylib -headerpad_max_install_names -o libplds4.dylib ./plarena.o ./plhash.o ./plvrsion.o     -L/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/lib -lnspr4
../../config/./nsinstall -R -m 444 ../../../lib/ds/plarenas.h ../../../lib/ds/plarena.h ../../../lib/ds/plhash.h /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include
../../config/./nsinstall -R -m 444 ./libplds4.a ./libplds4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/lib
../../config/./nsinstall -R -m 444 ./libplds4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/bin
make -C libc export
make -C include export
../../../config/./nsinstall -R -m 444 ../../../../lib/libc/include/plbase64.h ../../../../lib/libc/include/plerror.h ../../../../lib/libc/include/plgetopt.h ../../../../lib/libc/include/plstr.h /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include
make -C src export
gcc -arch i386 -o plvrsion.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  -I. ../../../../lib/libc/src/plvrsion.c
gcc -arch i386 -o strlen.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strlen.c
gcc -arch i386 -o strcpy.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strcpy.c
gcc -arch i386 -o strdup.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strdup.c
gcc -arch i386 -o strcase.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strcase.c
gcc -arch i386 -o strcat.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strcat.c
gcc -arch i386 -o strcmp.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strcmp.c
gcc -arch i386 -o strchr.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strchr.c
gcc -arch i386 -o strpbrk.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strpbrk.c
gcc -arch i386 -o strstr.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strstr.c
gcc -arch i386 -o strtok.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/strtok.c
gcc -arch i386 -o base64.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/base64.c
../../../../lib/libc/src/base64.c: In function 'PL_Base64Decode':
../../../../lib/libc/src/base64.c:300: warning: 'rv' may be used uninitialized in this function
gcc -arch i386 -o plerror.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/plerror.c
gcc -arch i386 -o plgetopt.o -c      -Wall -fno-common -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DXP_UNIX=1 -DDARWIN=1 -DHAVE_BSD_FLOCK=1 -DHAVE_SOCKLEN_T=1 -DXP_MACOSX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/include  ../../../../lib/libc/src/plgetopt.c
rm -f libplc4.a
/usr/bin/ar cr libplc4.a ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o  
ranlib libplc4.a
rm -f libplc4.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -all_load -install_name @executable_path/libplc4.dylib -headerpad_max_install_names -o libplc4.dylib ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o     -L/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/lib -lnspr4
../../../config/./nsinstall -R -m 444 ./libplc4.a ./libplc4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../config/./nsinstall -R -m 444 ./libplc4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/../../dist/Darwin9.8.0_OPT.OBJ/bin
make -C ../dbm export libs
cd include; make export
Creating ../../../dist/public/dbm
../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm
cd src; make export
make[2]: Nothing to be done for `export'.
cd include; make libs
make[2]: Nothing to be done for `libs'.
cd src; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/db.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/db.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/h_bigkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_bigkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/h_func.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_func.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/h_log2.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_log2.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/h_page.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_page.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/hash.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/hash_buf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash_buf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/mktemp.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/mktemp.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dirent.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  dirent.c
rm -f Darwin9.8.0_OPT.OBJ/libdbm.a
ar cr Darwin9.8.0_OPT.OBJ/libdbm.a Darwin9.8.0_OPT.OBJ/db.o Darwin9.8.0_OPT.OBJ/h_bigkey.o Darwin9.8.0_OPT.OBJ/h_func.o Darwin9.8.0_OPT.OBJ/h_log2.o Darwin9.8.0_OPT.OBJ/h_page.o Darwin9.8.0_OPT.OBJ/hash.o Darwin9.8.0_OPT.OBJ/hash_buf.o Darwin9.8.0_OPT.OBJ/mktemp.o Darwin9.8.0_OPT.OBJ/dirent.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libdbm.a(dirent.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libdbm.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libdbm.a(dirent.o) has no symbols
../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libdbm.a ../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd lib; make export
cd util; make export
Creating ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss
Creating ../../../../dist/private/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss
cd freebl; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss
cd sqlite; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 sqlite3.h ../../../../dist/private/nss
cd softoken; make export
cd legacydb; make export
There are no private exports.
cd legacydb; make private_export
There are no private exports.
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss
cd base; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss
cd dev; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss
cd pki; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss
cd libpkix; make export
cd include; make export
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
cd pkix; make export
cd certsel; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
cd crlsel; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
cd checker; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
cd params; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
cd results; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
cd store; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
cd top; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
cd util; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
cd certsel; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
cd crlsel; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
cd checker; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
cd params; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
cd results; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
cd store; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
cd top; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
cd util; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
There are no private exports.
cd pkix_pl_nss; make export
cd pki; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
cd system; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
cd module; make export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
cd pki; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
cd system; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
cd module; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
There are no private exports.
cd include; make private_export
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
cd pkix; make private_export
cd certsel; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
cd crlsel; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
cd checker; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
cd params; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
cd results; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
cd store; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
cd top; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
cd util; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
There are no private exports.
cd pkix_pl_nss; make private_export
cd pki; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
cd system; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
cd module; make private_export
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
There are no private exports.
There are no private exports.
cd certdb; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss
cd certhigh; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss
cd pk11wrap; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss
cd cryptohi; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../../dist/public/nss
There are no private exports.
cd nss; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss
cd ssl; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss
There are no private exports.
cd pkcs12; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss
cd pkcs7; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss
cd smime; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss
cd crmf; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss
cd jar; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss
cd ckfw; make export
cd builtins; make export
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss
cd builtins; make private_export
There are no private exports.
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss
cd cmd; make export
cd lib; make export
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../../dist/private/nss
cd addbuiltin; make export
make[2]: Nothing to be done for `export'.
cd atob; make export
make[2]: Nothing to be done for `export'.
cd bltest; make export
make[2]: Nothing to be done for `export'.
cd btoa; make export
make[2]: Nothing to be done for `export'.
cd certcgi; make export
make[2]: Nothing to be done for `export'.
cd certutil; make export
make[2]: Nothing to be done for `export'.
cd checkcert; make export
make[2]: Nothing to be done for `export'.
cd chktest; make export
make[2]: Nothing to be done for `export'.
cd crlutil; make export
make[2]: Nothing to be done for `export'.
cd crmftest; make export
make[2]: Nothing to be done for `export'.
cd dbtest; make export
make[2]: Nothing to be done for `export'.
cd derdump; make export
make[2]: Nothing to be done for `export'.
cd digest; make export
make[2]: Nothing to be done for `export'.
cd httpserv; make export
make[2]: Nothing to be done for `export'.
cd fipstest; make export
make[2]: Nothing to be done for `export'.
cd listsuites; make export
make[2]: Nothing to be done for `export'.
cd makepqg; make export
make[2]: Nothing to be done for `export'.
cd multinit; make export
make[2]: Nothing to be done for `export'.
cd ocspclnt; make export
make[2]: Nothing to be done for `export'.
cd ocspresp; make export
make[2]: Nothing to be done for `export'.
cd oidcalc; make export
make[2]: Nothing to be done for `export'.
cd p7content; make export
make[2]: Nothing to be done for `export'.
cd p7env; make export
make[2]: Nothing to be done for `export'.
cd p7sign; make export
make[2]: Nothing to be done for `export'.
cd p7verify; make export
make[2]: Nothing to be done for `export'.
cd pk12util; make export
make[2]: Nothing to be done for `export'.
cd pk11mode; make export
make[2]: Nothing to be done for `export'.
cd pk1sign; make export
make[2]: Nothing to be done for `export'.
cd pkix-errcodes; make export
make[2]: Nothing to be done for `export'.
cd pp; make export
make[2]: Nothing to be done for `export'.
cd pwdecrypt; make export
make[2]: Nothing to be done for `export'.
cd rsaperf; make export
make[2]: Nothing to be done for `export'.
cd sdrtest; make export
make[2]: Nothing to be done for `export'.
cd selfserv; make export
make[2]: Nothing to be done for `export'.
cd signtool; make export
make[2]: Nothing to be done for `export'.
cd signver; make export
make[2]: Nothing to be done for `export'.
cd shlibsign; make export
cd mangle; make export
make[3]: Nothing to be done for `export'.
cd smimetools; make export
make[2]: Nothing to be done for `export'.
cd ssltap; make export
make[2]: Nothing to be done for `export'.
cd strsclnt; make export
make[2]: Nothing to be done for `export'.
cd symkeyutil; make export
make[2]: Nothing to be done for `export'.
cd tests; make export
make[2]: Nothing to be done for `export'.
cd tstclnt; make export
make[2]: Nothing to be done for `export'.
cd vfychain; make export
make[2]: Nothing to be done for `export'.
cd vfyserv; make export
make[2]: Nothing to be done for `export'.
cd modutil; make export
make[2]: Nothing to be done for `export'.
cd lib; make libs
cd util; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/quickder.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  quickder.c
quickder.c: In function 'DecodeItem':
quickder.c:605: warning: 'mark.len' may be used uninitialized in this function
quickder.c:605: warning: 'mark.data' may be used uninitialized in this function
quickder.c:605: warning: 'mark.type' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secdig.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secdig.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/derdec.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derdec.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/derenc.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derenc.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dersubr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dersubr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dertime.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dertime.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/errstrs.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  errstrs.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nssb64d.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64d.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nssb64e.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64e.c
nssb64e.c: In function 'NSSBase64_EncodeItem_Util':
nssb64e.c:637: warning: 'out_len' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nssrwlk.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssrwlk.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nssilock.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssilock.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/oidstring.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  oidstring.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/portreg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  portreg.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secalgid.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secalgid.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secasn1d.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1d.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secasn1e.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1e.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secasn1u.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1u.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secitem.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secitem.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secload.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secload.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secoid.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secoid.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sectime.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sectime.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secport.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secport.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/templates.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  templates.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/utf8.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utf8.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/utilmod.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilmod.c
utilmod.c: In function 'nssutil_DeleteSecmodDB':
utilmod.c:451: warning: 'name_len' may be used uninitialized in this function
utilmod.c:451: warning: 'lib_len' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/utilpars.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilpars.c
rm -f Darwin9.8.0_OPT.OBJ/libnssutil.a
ar cr Darwin9.8.0_OPT.OBJ/libnssutil.a Darwin9.8.0_OPT.OBJ/quickder.o Darwin9.8.0_OPT.OBJ/secdig.o Darwin9.8.0_OPT.OBJ/derdec.o Darwin9.8.0_OPT.OBJ/derenc.o Darwin9.8.0_OPT.OBJ/dersubr.o Darwin9.8.0_OPT.OBJ/dertime.o Darwin9.8.0_OPT.OBJ/errstrs.o Darwin9.8.0_OPT.OBJ/nssb64d.o Darwin9.8.0_OPT.OBJ/nssb64e.o Darwin9.8.0_OPT.OBJ/nssrwlk.o Darwin9.8.0_OPT.OBJ/nssilock.o Darwin9.8.0_OPT.OBJ/oidstring.o Darwin9.8.0_OPT.OBJ/portreg.o Darwin9.8.0_OPT.OBJ/secalgid.o Darwin9.8.0_OPT.OBJ/secasn1d.o Darwin9.8.0_OPT.OBJ/secasn1e.o Darwin9.8.0_OPT.OBJ/secasn1u.o Darwin9.8.0_OPT.OBJ/secitem.o Darwin9.8.0_OPT.OBJ/secload.o Darwin9.8.0_OPT.OBJ/secoid.o Darwin9.8.0_OPT.OBJ/sectime.o Darwin9.8.0_OPT.OBJ/secport.o Darwin9.8.0_OPT.OBJ/templates.o Darwin9.8.0_OPT.OBJ/utf8.o Darwin9.8.0_OPT.OBJ/utilmod.o Darwin9.8.0_OPT.OBJ/utilpars.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libnssutil.a(nssilock.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libnssutil.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libnssutil.a(nssilock.o) has no symbols
grep -v ';+' nssutil.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/nssutil.def
rm -f Darwin9.8.0_OPT.OBJ/libnssutil3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libnssutil3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libnssutil3.dylib Darwin9.8.0_OPT.OBJ/quickder.o Darwin9.8.0_OPT.OBJ/secdig.o Darwin9.8.0_OPT.OBJ/derdec.o Darwin9.8.0_OPT.OBJ/derenc.o Darwin9.8.0_OPT.OBJ/dersubr.o Darwin9.8.0_OPT.OBJ/dertime.o Darwin9.8.0_OPT.OBJ/errstrs.o Darwin9.8.0_OPT.OBJ/nssb64d.o Darwin9.8.0_OPT.OBJ/nssb64e.o Darwin9.8.0_OPT.OBJ/nssrwlk.o Darwin9.8.0_OPT.OBJ/nssilock.o Darwin9.8.0_OPT.OBJ/oidstring.o Darwin9.8.0_OPT.OBJ/portreg.o Darwin9.8.0_OPT.OBJ/secalgid.o Darwin9.8.0_OPT.OBJ/secasn1d.o Darwin9.8.0_OPT.OBJ/secasn1e.o Darwin9.8.0_OPT.OBJ/secasn1u.o Darwin9.8.0_OPT.OBJ/secitem.o Darwin9.8.0_OPT.OBJ/secload.o Darwin9.8.0_OPT.OBJ/secoid.o Darwin9.8.0_OPT.OBJ/sectime.o Darwin9.8.0_OPT.OBJ/secport.o Darwin9.8.0_OPT.OBJ/templates.o Darwin9.8.0_OPT.OBJ/utf8.o Darwin9.8.0_OPT.OBJ/utilmod.o Darwin9.8.0_OPT.OBJ/utilpars.o    -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
chmod +x Darwin9.8.0_OPT.OBJ/libnssutil3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/nssutil.def Darwin9.8.0_OPT.OBJ/libnssutil3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnssutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libnssutil3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd freebl; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/loader.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  loader.c
loader.c: In function 'BL_Unload':
loader.c:902: warning: unused variable 'status'
rm -f Darwin9.8.0_OPT.OBJ/libfreebl.a
ar cr Darwin9.8.0_OPT.OBJ/libfreebl.a Darwin9.8.0_OPT.OBJ/loader.o
ranlib Darwin9.8.0_OPT.OBJ/libfreebl.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
mkdir Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB
make FREEBL_CHILD_BUILD=1 \
 OBJDIR=Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/freeblver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  freeblver.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ldvector.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ldvector.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/sysrand.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sysrand.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/sha_fast.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha_fast.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/md2.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md2.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/md5.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md5.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/sha512.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha512.c
sha512.c: In function 'SHA512_Compress':
sha512.c:897: warning: unused variable 't1'
sha512.c:919: warning: unused variable 't2'
sha512.c:919: warning: unused variable 't1'
sha512.c: In function 'SHA512_End':
sha512.c:1193: warning: unused variable 't1'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/alghmac.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alghmac.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/rawhash.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rawhash.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/alg2268.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alg2268.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/arcfour.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfour.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/arcfive.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfive.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/desblapi.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  desblapi.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/des.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  des.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/drbg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  drbg.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/cts.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  cts.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ctr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ctr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/gcm.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  gcm.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/rijndael.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rijndael.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/aeskeywrap.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  aeskeywrap.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/camellia.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  camellia.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/dh.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dh.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ec.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/pqg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  pqg.c
pqg.c: In function 'makeGfromIndex':
pqg.c:1148: warning: 'hashobj' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/dsa.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dsa.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/rsa.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rsa.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/shvfy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  shvfy.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/tlsprfalg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  tlsprfalg.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/seed.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  seed.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/jpake.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  jpake.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpprime.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpprime.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpmontg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpmontg.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mplogic.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mplogic.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpi.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpi.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mp_gf2m.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mp_gf2m.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpcpucache.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpcpucache.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl_curve.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_curve.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl_mult.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_mult.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl_gf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_gf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_aff.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_aff.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_jac.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jac.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_mont.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_mont.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec_naf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec_naf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_jm.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jm.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_aff.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_aff.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_mont.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_mont.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_proj.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_proj.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_163.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_163.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_193.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_193.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_233.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_233.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_192.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_192.c
ecl/ecp_192.c: In function 'ec_GFp_nistp192_mod':
ecl/ecp_192.c:123: warning: suggest parentheses around && within ||
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_224.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_224.c
ecl/ecp_224.c: In function 'ec_GFp_nistp224_mod':
ecl/ecp_224.c:26: warning: unused variable 'a3a'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_256.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_256.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_384.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_384.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_521.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_521.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpi_sse2.o -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -DMP_USE_UINT_DIGIT -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_API_COMPATIBLE -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -c mpi/mpi_sse2.s
grep -v ';+' freebl.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/freebl.def
rm -f Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libfreebl3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.dylib Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/freeblver.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ldvector.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/sysrand.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/sha_fast.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/md2.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/md5.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/sha512.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/alghmac.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/rawhash.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/alg2268.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/arcfour.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/arcfive.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/desblapi.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/des.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/drbg.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/cts.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ctr.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/gcm.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/rijndael.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/aeskeywrap.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/camellia.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/dh.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/pqg.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/dsa.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/rsa.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/shvfy.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/tlsprfalg.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/seed.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/jpake.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpprime.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpmontg.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mplogic.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpi.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mp_gf2m.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpcpucache.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl_curve.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl_mult.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecl_gf.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_aff.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_jac.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_mont.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec_naf.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_jm.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_aff.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_mont.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_proj.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_163.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_193.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ec2_233.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_192.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_224.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_256.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_384.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/ecp_521.o Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/mpi_sse2.o    -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnspr4  -dylib_file @executable_path/libplc4.dylib:../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.dylib -dylib_file @executable_path/libplds4.dylib:../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.dylib 
chmod +x Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/freebl.def Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd sqlite; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sqlite3.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSQLITE_THREADSAFE=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sqlite3.c
rm -f Darwin9.8.0_OPT.OBJ/libsqlite.a
ar cr Darwin9.8.0_OPT.OBJ/libsqlite.a Darwin9.8.0_OPT.OBJ/sqlite3.o
ranlib Darwin9.8.0_OPT.OBJ/libsqlite.a
grep -v ';+' sqlite.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/sqlite.def
rm -f Darwin9.8.0_OPT.OBJ/libsqlite3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 9 -current_version 9.6 -install_name @executable_path/libsqlite3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libsqlite3.dylib Darwin9.8.0_OPT.OBJ/sqlite3.o     
chmod +x Darwin9.8.0_OPT.OBJ/libsqlite3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/sqlite.def Darwin9.8.0_OPT.OBJ/libsqlite3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libsqlite.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libsqlite3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd softoken; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ecdecode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ecdecode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/fipsaudt.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipsaudt.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/fipstest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/fipstokn.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstokn.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lgglue.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lgglue.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lowkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lowpbe.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowpbe.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/padbuf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  padbuf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkcs11.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11.c
pkcs11.c: In function 'NSC_CreateObject':
pkcs11.c:3921: warning: 'moduleIndex' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkcs11c.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11c.c
pkcs11c.c: In function 'NSC_GenerateKey':
pkcs11c.c:3299: warning: 'hashType' may be used uninitialized in this function
pkcs11c.c: In function 'NSC_GenerateKeyPair':
pkcs11c.c:3538: warning: 'subPrimeLen' may be used uninitialized in this function
pkcs11c.c:3537: warning: 'modulusLen' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkcs11u.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11u.c
pkcs11u.c: In function 'sftk_DeleteObject':
pkcs11u.c:1177: warning: unused variable 'to'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/rsawrapr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  rsawrapr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sdb.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sdb.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sftkdb.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkdb.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sftkpars.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpars.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sftkpwd.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpwd.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/softkver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  softkver.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/tlsprf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  tlsprf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jpakesftk.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.dylib\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jpakesftk.c
rm -f Darwin9.8.0_OPT.OBJ/libsoftokn.a
ar cr Darwin9.8.0_OPT.OBJ/libsoftokn.a Darwin9.8.0_OPT.OBJ/ecdecode.o Darwin9.8.0_OPT.OBJ/fipsaudt.o Darwin9.8.0_OPT.OBJ/fipstest.o Darwin9.8.0_OPT.OBJ/fipstokn.o Darwin9.8.0_OPT.OBJ/lgglue.o Darwin9.8.0_OPT.OBJ/lowkey.o Darwin9.8.0_OPT.OBJ/lowpbe.o Darwin9.8.0_OPT.OBJ/padbuf.o Darwin9.8.0_OPT.OBJ/pkcs11.o Darwin9.8.0_OPT.OBJ/pkcs11c.o Darwin9.8.0_OPT.OBJ/pkcs11u.o Darwin9.8.0_OPT.OBJ/rsawrapr.o Darwin9.8.0_OPT.OBJ/sdb.o Darwin9.8.0_OPT.OBJ/sftkdb.o Darwin9.8.0_OPT.OBJ/sftkpars.o Darwin9.8.0_OPT.OBJ/sftkpwd.o Darwin9.8.0_OPT.OBJ/softkver.o Darwin9.8.0_OPT.OBJ/tlsprf.o Darwin9.8.0_OPT.OBJ/jpakesftk.o
ranlib Darwin9.8.0_OPT.OBJ/libsoftokn.a
grep -v ';+' softokn.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/softokn.def
rm -f Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libsoftokn3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib Darwin9.8.0_OPT.OBJ/ecdecode.o Darwin9.8.0_OPT.OBJ/fipsaudt.o Darwin9.8.0_OPT.OBJ/fipstest.o Darwin9.8.0_OPT.OBJ/fipstokn.o Darwin9.8.0_OPT.OBJ/lgglue.o Darwin9.8.0_OPT.OBJ/lowkey.o Darwin9.8.0_OPT.OBJ/lowpbe.o Darwin9.8.0_OPT.OBJ/padbuf.o Darwin9.8.0_OPT.OBJ/pkcs11.o Darwin9.8.0_OPT.OBJ/pkcs11c.o Darwin9.8.0_OPT.OBJ/pkcs11u.o Darwin9.8.0_OPT.OBJ/rsawrapr.o Darwin9.8.0_OPT.OBJ/sdb.o Darwin9.8.0_OPT.OBJ/sftkdb.o Darwin9.8.0_OPT.OBJ/sftkpars.o Darwin9.8.0_OPT.OBJ/sftkpwd.o Darwin9.8.0_OPT.OBJ/softkver.o Darwin9.8.0_OPT.OBJ/tlsprf.o Darwin9.8.0_OPT.OBJ/jpakesftk.o   ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
chmod +x Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/softokn.def Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd legacydb; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dbmshim.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  dbmshim.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/keydb.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  keydb.c
keydb.c: In function 'lg_PutMetaData':
keydb.c:1382: warning: 'algid' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lgattr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgattr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lgcreate.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgcreate.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lgdestroy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgdestroy.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lgfind.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgfind.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lginit.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lginit.c
lginit.c: In function 'legacy_Open':
lginit.c:611: warning: 'certdbPtr' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lgutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lowcert.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowcert.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lowkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pcertdb.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pcertdb.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11db.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pk11db.c
rm -f Darwin9.8.0_OPT.OBJ/libnssdbm.a
ar cr Darwin9.8.0_OPT.OBJ/libnssdbm.a Darwin9.8.0_OPT.OBJ/dbmshim.o Darwin9.8.0_OPT.OBJ/keydb.o Darwin9.8.0_OPT.OBJ/lgattr.o Darwin9.8.0_OPT.OBJ/lgcreate.o Darwin9.8.0_OPT.OBJ/lgdestroy.o Darwin9.8.0_OPT.OBJ/lgfind.o Darwin9.8.0_OPT.OBJ/lginit.o Darwin9.8.0_OPT.OBJ/lgutil.o Darwin9.8.0_OPT.OBJ/lowcert.o Darwin9.8.0_OPT.OBJ/lowkey.o Darwin9.8.0_OPT.OBJ/pcertdb.o Darwin9.8.0_OPT.OBJ/pk11db.o
ranlib Darwin9.8.0_OPT.OBJ/libnssdbm.a
grep -v ';+' nssdbm.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/nssdbm.def
rm -f Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libnssdbm3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib Darwin9.8.0_OPT.OBJ/dbmshim.o Darwin9.8.0_OPT.OBJ/keydb.o Darwin9.8.0_OPT.OBJ/lgattr.o Darwin9.8.0_OPT.OBJ/lgcreate.o Darwin9.8.0_OPT.OBJ/lgdestroy.o Darwin9.8.0_OPT.OBJ/lgfind.o Darwin9.8.0_OPT.OBJ/lginit.o Darwin9.8.0_OPT.OBJ/lgutil.o Darwin9.8.0_OPT.OBJ/lowcert.o Darwin9.8.0_OPT.OBJ/lowkey.o Darwin9.8.0_OPT.OBJ/pcertdb.o Darwin9.8.0_OPT.OBJ/pk11db.o   ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  -L../../../../../dist/Darwin9.8.0_OPT.OBJ/lib -L../../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
chmod +x Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/nssdbm.def Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnssdbm.a ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd base; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/arena.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  arena.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/error.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  error.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/errorval.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  errorval.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/hashops.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hashops.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/libc.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  libc.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/tracker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tracker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/item.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  item.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/utf8.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  utf8.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/list.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  list.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/hash.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
rm -f Darwin9.8.0_OPT.OBJ/libnssb.a
ar cr Darwin9.8.0_OPT.OBJ/libnssb.a Darwin9.8.0_OPT.OBJ/arena.o Darwin9.8.0_OPT.OBJ/error.o Darwin9.8.0_OPT.OBJ/errorval.o Darwin9.8.0_OPT.OBJ/hashops.o Darwin9.8.0_OPT.OBJ/libc.o Darwin9.8.0_OPT.OBJ/tracker.o Darwin9.8.0_OPT.OBJ/item.o Darwin9.8.0_OPT.OBJ/utf8.o Darwin9.8.0_OPT.OBJ/list.o Darwin9.8.0_OPT.OBJ/hash.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libnssb.a(tracker.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libnssb.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libnssb.a(tracker.o) has no symbols
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd dev; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/devslot.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devslot.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/devtoken.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devtoken.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/devutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ckhelper.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  ckhelper.c
rm -f Darwin9.8.0_OPT.OBJ/libnssdev.a
ar cr Darwin9.8.0_OPT.OBJ/libnssdev.a Darwin9.8.0_OPT.OBJ/devslot.o Darwin9.8.0_OPT.OBJ/devtoken.o Darwin9.8.0_OPT.OBJ/devutil.o Darwin9.8.0_OPT.OBJ/ckhelper.o
ranlib Darwin9.8.0_OPT.OBJ/libnssdev.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd pki; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/asymmkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  asymmkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certificate.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certificate.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cryptocontext.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  cryptocontext.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/symmkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  symmkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/trustdomain.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  trustdomain.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/tdcache.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tdcache.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certdecode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certdecode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkistore.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkistore.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkibase.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkibase.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pki3hack.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pki3hack.c
rm -f Darwin9.8.0_OPT.OBJ/libnsspki.a
ar cr Darwin9.8.0_OPT.OBJ/libnsspki.a Darwin9.8.0_OPT.OBJ/asymmkey.o Darwin9.8.0_OPT.OBJ/certificate.o Darwin9.8.0_OPT.OBJ/cryptocontext.o Darwin9.8.0_OPT.OBJ/symmkey.o Darwin9.8.0_OPT.OBJ/trustdomain.o Darwin9.8.0_OPT.OBJ/tdcache.o Darwin9.8.0_OPT.OBJ/certdecode.o Darwin9.8.0_OPT.OBJ/pkistore.o Darwin9.8.0_OPT.OBJ/pkibase.o Darwin9.8.0_OPT.OBJ/pki3hack.o
ranlib Darwin9.8.0_OPT.OBJ/libnsspki.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd libpkix; make libs
cd include; make libs
make[3]: Nothing to be done for `libs'.
cd pkix; make libs
cd certsel; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_certselector.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certselector.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_comcertselparams.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcertselparams.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixcertsel.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixcertsel.a Darwin9.8.0_OPT.OBJ/pkix_certselector.o Darwin9.8.0_OPT.OBJ/pkix_comcertselparams.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixcertsel.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd crlsel; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_crlselector.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlselector.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcrlselparams.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixcrlsel.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixcrlsel.a Darwin9.8.0_OPT.OBJ/pkix_crlselector.o Darwin9.8.0_OPT.OBJ/pkix_comcrlselparams.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixcrlsel.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd checker; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_basicconstraintschecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_certchainchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certchainchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_crlchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_ekuchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ekuchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_expirationchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_expirationchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_namechainingchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_nameconstraintschecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_ocspchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ocspchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_revocationmethod.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationmethod.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_revocationchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationchecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_policychecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policychecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_signaturechecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_signaturechecker.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_targetcertchecker.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixchecker.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixchecker.a Darwin9.8.0_OPT.OBJ/pkix_basicconstraintschecker.o Darwin9.8.0_OPT.OBJ/pkix_certchainchecker.o Darwin9.8.0_OPT.OBJ/pkix_crlchecker.o Darwin9.8.0_OPT.OBJ/pkix_ekuchecker.o Darwin9.8.0_OPT.OBJ/pkix_expirationchecker.o Darwin9.8.0_OPT.OBJ/pkix_namechainingchecker.o Darwin9.8.0_OPT.OBJ/pkix_nameconstraintschecker.o Darwin9.8.0_OPT.OBJ/pkix_ocspchecker.o Darwin9.8.0_OPT.OBJ/pkix_revocationmethod.o Darwin9.8.0_OPT.OBJ/pkix_revocationchecker.o Darwin9.8.0_OPT.OBJ/pkix_policychecker.o Darwin9.8.0_OPT.OBJ/pkix_signaturechecker.o Darwin9.8.0_OPT.OBJ/pkix_targetcertchecker.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixchecker.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd params; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_trustanchor.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_trustanchor.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_procparams.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_procparams.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_valparams.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valparams.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_resourcelimits.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_resourcelimits.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixparams.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixparams.a Darwin9.8.0_OPT.OBJ/pkix_trustanchor.o Darwin9.8.0_OPT.OBJ/pkix_procparams.o Darwin9.8.0_OPT.OBJ/pkix_valparams.o Darwin9.8.0_OPT.OBJ/pkix_resourcelimits.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixparams.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixparams.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd results; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_buildresult.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_buildresult.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_policynode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policynode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_valresult.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valresult.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_verifynode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_verifynode.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixresults.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixresults.a Darwin9.8.0_OPT.OBJ/pkix_buildresult.o Darwin9.8.0_OPT.OBJ/pkix_policynode.o Darwin9.8.0_OPT.OBJ/pkix_valresult.o Darwin9.8.0_OPT.OBJ/pkix_verifynode.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixresults.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixresults.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd store; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_store.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_store.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixstore.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixstore.a Darwin9.8.0_OPT.OBJ/pkix_store.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixstore.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixstore.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd top; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_validate.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_validate.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_lifecycle.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_lifecycle.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_build.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_build.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixtop.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixtop.a Darwin9.8.0_OPT.OBJ/pkix_validate.o Darwin9.8.0_OPT.OBJ/pkix_lifecycle.o Darwin9.8.0_OPT.OBJ/pkix_build.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixtop.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixtop.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd util; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_tools.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_tools.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_error.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_error.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_logger.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_logger.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_list.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_list.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_errpaths.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_errpaths.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixutil.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixutil.a Darwin9.8.0_OPT.OBJ/pkix_tools.o Darwin9.8.0_OPT.OBJ/pkix_error.o Darwin9.8.0_OPT.OBJ/pkix_logger.o Darwin9.8.0_OPT.OBJ/pkix_list.o Darwin9.8.0_OPT.OBJ/pkix_errpaths.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixutil.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixutil.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd pkix_pl_nss; make libs
cd pki; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_basicconstraints.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_cert.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_cert.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyinfo.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicymap.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyqualifier.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_crl.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crl.c
pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString':
pkix_pl_crl.c:354: warning: 'crlVersion' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_crldp.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crldp.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crlentry.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_date.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_date.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_generalname.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_generalname.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_infoaccess.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nameconstraints.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocsprequest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspresponse.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_publickey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_publickey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_x500name.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_x500name.c
pkix_pl_x500name.c:41: warning: 'pkix_pl_X500Name_ToString_Helper' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspcertid.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixpki.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixpki.a Darwin9.8.0_OPT.OBJ/pkix_pl_basicconstraints.o Darwin9.8.0_OPT.OBJ/pkix_pl_cert.o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyinfo.o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicymap.o Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyqualifier.o Darwin9.8.0_OPT.OBJ/pkix_pl_crl.o Darwin9.8.0_OPT.OBJ/pkix_pl_crldp.o Darwin9.8.0_OPT.OBJ/pkix_pl_crlentry.o Darwin9.8.0_OPT.OBJ/pkix_pl_date.o Darwin9.8.0_OPT.OBJ/pkix_pl_generalname.o Darwin9.8.0_OPT.OBJ/pkix_pl_infoaccess.o Darwin9.8.0_OPT.OBJ/pkix_pl_nameconstraints.o Darwin9.8.0_OPT.OBJ/pkix_pl_ocsprequest.o Darwin9.8.0_OPT.OBJ/pkix_pl_ocspresponse.o Darwin9.8.0_OPT.OBJ/pkix_pl_publickey.o Darwin9.8.0_OPT.OBJ/pkix_pl_x500name.o Darwin9.8.0_OPT.OBJ/pkix_pl_ocspcertid.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixpki.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixpki.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd system; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_bigint.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bigint.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bytearray.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_common.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_common.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_error.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_error.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_hashtable.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_lifecycle.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_mem.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mem.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_monitorlock.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_mutex.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mutex.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_object.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_object.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_oid.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_oid.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_primhash.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_primhash.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_rwlock.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_string.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_string.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixsystem.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixsystem.a Darwin9.8.0_OPT.OBJ/pkix_pl_bigint.o Darwin9.8.0_OPT.OBJ/pkix_pl_bytearray.o Darwin9.8.0_OPT.OBJ/pkix_pl_common.o Darwin9.8.0_OPT.OBJ/pkix_pl_error.o Darwin9.8.0_OPT.OBJ/pkix_pl_hashtable.o Darwin9.8.0_OPT.OBJ/pkix_pl_lifecycle.o Darwin9.8.0_OPT.OBJ/pkix_pl_mem.o Darwin9.8.0_OPT.OBJ/pkix_pl_monitorlock.o Darwin9.8.0_OPT.OBJ/pkix_pl_mutex.o Darwin9.8.0_OPT.OBJ/pkix_pl_object.o Darwin9.8.0_OPT.OBJ/pkix_pl_oid.o Darwin9.8.0_OPT.OBJ/pkix_pl_primhash.o Darwin9.8.0_OPT.OBJ/pkix_pl_rwlock.o Darwin9.8.0_OPT.OBJ/pkix_pl_string.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixsystem.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd module; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_aiamgr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_colcertstore.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpcertstore.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpdefaultclient.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaptemplates.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapcertstore.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapresponse.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaprequest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapdefaultclient.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nsscontext.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_pk11certstore.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix_pl_socket.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_socket.c
rm -f Darwin9.8.0_OPT.OBJ/libpkixmodule.a
ar cr Darwin9.8.0_OPT.OBJ/libpkixmodule.a Darwin9.8.0_OPT.OBJ/pkix_pl_aiamgr.o Darwin9.8.0_OPT.OBJ/pkix_pl_colcertstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_httpcertstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_httpdefaultclient.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldaptemplates.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapcertstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapresponse.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldaprequest.o Darwin9.8.0_OPT.OBJ/pkix_pl_ldapdefaultclient.o Darwin9.8.0_OPT.OBJ/pkix_pl_nsscontext.o Darwin9.8.0_OPT.OBJ/pkix_pl_pk11certstore.o Darwin9.8.0_OPT.OBJ/pkix_pl_socket.o
ranlib Darwin9.8.0_OPT.OBJ/libpkixmodule.a
../../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd certdb; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/alg1485.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  alg1485.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certdb.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certdb.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certv3.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certv3.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certxutl.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certxutl.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crl.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crl.c
crl.c: In function 'cert_CheckCertRevocationStatus':
crl.c:2690: warning: unused variable 'rv2'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/genname.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  genname.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/stanpcertdb.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  stanpcertdb.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/polcyxtn.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  polcyxtn.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secname.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secname.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/xauthkid.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xauthkid.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/xbsconst.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xbsconst.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/xconst.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xconst.c
rm -f Darwin9.8.0_OPT.OBJ/libcertdb.a
ar cr Darwin9.8.0_OPT.OBJ/libcertdb.a Darwin9.8.0_OPT.OBJ/alg1485.o Darwin9.8.0_OPT.OBJ/certdb.o Darwin9.8.0_OPT.OBJ/certv3.o Darwin9.8.0_OPT.OBJ/certxutl.o Darwin9.8.0_OPT.OBJ/crl.o Darwin9.8.0_OPT.OBJ/genname.o Darwin9.8.0_OPT.OBJ/stanpcertdb.o Darwin9.8.0_OPT.OBJ/polcyxtn.o Darwin9.8.0_OPT.OBJ/secname.o Darwin9.8.0_OPT.OBJ/xauthkid.o Darwin9.8.0_OPT.OBJ/xbsconst.o Darwin9.8.0_OPT.OBJ/xconst.o
ranlib Darwin9.8.0_OPT.OBJ/libcertdb.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd certhigh; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certhtml.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhtml.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certreq.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certreq.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crlv2.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crlv2.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ocsp.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocsp.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ocspsig.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocspsig.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certhigh.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhigh.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certvfy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfy.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certvfypkix.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkix.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certvfypkixprint.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkixprint.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/xcrldist.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xcrldist.c
rm -f Darwin9.8.0_OPT.OBJ/libcerthi.a
ar cr Darwin9.8.0_OPT.OBJ/libcerthi.a Darwin9.8.0_OPT.OBJ/certhtml.o Darwin9.8.0_OPT.OBJ/certreq.o Darwin9.8.0_OPT.OBJ/crlv2.o Darwin9.8.0_OPT.OBJ/ocsp.o Darwin9.8.0_OPT.OBJ/ocspsig.o Darwin9.8.0_OPT.OBJ/certhigh.o Darwin9.8.0_OPT.OBJ/certvfy.o Darwin9.8.0_OPT.OBJ/certvfypkix.o Darwin9.8.0_OPT.OBJ/certvfypkixprint.o Darwin9.8.0_OPT.OBJ/xcrldist.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libcerthi.a(certvfypkixprint.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libcerthi.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libcerthi.a(certvfypkixprint.o) has no symbols
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd pk11wrap; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dev3hack.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dev3hack.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11akey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11akey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11auth.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11auth.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11cert.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cert.c
pk11cert.c: In function 'PK11_IsUserCert':
pk11cert.c:144: warning: enumeration value 'rsaPssKey' not handled in switch
pk11cert.c:144: warning: enumeration value 'rsaOaepKey' not handled in switch
pk11cert.c: In function 'PK11_FindCertFromDERCertItem':
pk11cert.c:2146: warning: unused variable 'td'
pk11cert.c: In function 'PK11_FindCertAndKeyByRecipientListNew':
pk11cert.c:1668: warning: 'rlIndex' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11cxt.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cxt.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11err.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11err.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11kea.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11kea.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11list.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11list.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11load.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11load.c
pk11load.c: In function 'SECMOD_UnloadModule':
pk11load.c:569: warning: unused variable 'status'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11mech.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11mech.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11merge.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11merge.c
pk11merge.c: In function 'pk11_mergeByObjectIDs':
pk11merge.c:1263: warning: 'error' may be used uninitialized in this function
pk11merge.c:751: warning: 'error' may be used uninitialized in this function
pk11merge.c: In function 'PK11_MergeTokens':
pk11merge.c:1327: warning: 'error' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11nobj.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11nobj.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11obj.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11obj.c
pk11obj.c: In function 'PK11_WriteRawAttribute':
pk11obj.c:1400: warning: 'handle' may be used uninitialized in this function
pk11obj.c: In function 'PK11_ReadRawAttribute':
pk11obj.c:1453: warning: 'handle' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11pars.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pars.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11pbe.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pbe.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11pk12.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pk12.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11pqg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pqg.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11sdr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11sdr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11skey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11skey.c
pk11skey.c: In function 'PK11_PubDerive':
pk11skey.c:1822: warning: enumeration value 'rsaPssKey' not handled in switch
pk11skey.c:1822: warning: enumeration value 'rsaOaepKey' not handled in switch
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11slot.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11slot.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11util.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11util.c
rm -f Darwin9.8.0_OPT.OBJ/libpk11wrap.a
ar cr Darwin9.8.0_OPT.OBJ/libpk11wrap.a Darwin9.8.0_OPT.OBJ/dev3hack.o Darwin9.8.0_OPT.OBJ/pk11akey.o Darwin9.8.0_OPT.OBJ/pk11auth.o Darwin9.8.0_OPT.OBJ/pk11cert.o Darwin9.8.0_OPT.OBJ/pk11cxt.o Darwin9.8.0_OPT.OBJ/pk11err.o Darwin9.8.0_OPT.OBJ/pk11kea.o Darwin9.8.0_OPT.OBJ/pk11list.o Darwin9.8.0_OPT.OBJ/pk11load.o Darwin9.8.0_OPT.OBJ/pk11mech.o Darwin9.8.0_OPT.OBJ/pk11merge.o Darwin9.8.0_OPT.OBJ/pk11nobj.o Darwin9.8.0_OPT.OBJ/pk11obj.o Darwin9.8.0_OPT.OBJ/pk11pars.o Darwin9.8.0_OPT.OBJ/pk11pbe.o Darwin9.8.0_OPT.OBJ/pk11pk12.o Darwin9.8.0_OPT.OBJ/pk11pqg.o Darwin9.8.0_OPT.OBJ/pk11sdr.o Darwin9.8.0_OPT.OBJ/pk11skey.o Darwin9.8.0_OPT.OBJ/pk11slot.o Darwin9.8.0_OPT.OBJ/pk11util.o
ranlib Darwin9.8.0_OPT.OBJ/libpk11wrap.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd cryptohi; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sechash.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sechash.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/seckey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  seckey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secsign.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secsign.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secvfy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secvfy.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dsautil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dsautil.c
rm -f Darwin9.8.0_OPT.OBJ/libcryptohi.a
ar cr Darwin9.8.0_OPT.OBJ/libcryptohi.a Darwin9.8.0_OPT.OBJ/sechash.o Darwin9.8.0_OPT.OBJ/seckey.o Darwin9.8.0_OPT.OBJ/secsign.o Darwin9.8.0_OPT.OBJ/secvfy.o Darwin9.8.0_OPT.OBJ/dsautil.o
ranlib Darwin9.8.0_OPT.OBJ/libcryptohi.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd nss; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nssinit.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssinit.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nssver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssver.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/utilwrap.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilwrap.c
rm -f Darwin9.8.0_OPT.OBJ/libnss.a
ar cr Darwin9.8.0_OPT.OBJ/libnss.a Darwin9.8.0_OPT.OBJ/nssinit.o Darwin9.8.0_OPT.OBJ/nssver.o Darwin9.8.0_OPT.OBJ/utilwrap.o
ranlib Darwin9.8.0_OPT.OBJ/libnss.a
grep -v ';+' nss.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/nss.def
rm -f Darwin9.8.0_OPT.OBJ/libnss3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libnss3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libnss3.dylib Darwin9.8.0_OPT.OBJ/nssinit.o Darwin9.8.0_OPT.OBJ/nssver.o Darwin9.8.0_OPT.OBJ/utilwrap.o ../certhigh/Darwin9.8.0_OPT.OBJ/certhtml.o ../certhigh/Darwin9.8.0_OPT.OBJ/certreq.o ../certhigh/Darwin9.8.0_OPT.OBJ/crlv2.o ../certhigh/Darwin9.8.0_OPT.OBJ/ocsp.o ../certhigh/Darwin9.8.0_OPT.OBJ/ocspsig.o ../certhigh/Darwin9.8.0_OPT.OBJ/certhigh.o ../certhigh/Darwin9.8.0_OPT.OBJ/certvfy.o ../certhigh/Darwin9.8.0_OPT.OBJ/certvfypkix.o ../certhigh/Darwin9.8.0_OPT.OBJ/certvfypkixprint.o ../certhigh/Darwin9.8.0_OPT.OBJ/xcrldist.o ../cryptohi/Darwin9.8.0_OPT.OBJ/sechash.o ../cryptohi/Darwin9.8.0_OPT.OBJ/seckey.o ../cryptohi/Darwin9.8.0_OPT.OBJ/secsign.o ../cryptohi/Darwin9.8.0_OPT.OBJ/secvfy.o ../cryptohi/Darwin9.8.0_OPT.OBJ/dsautil.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/dev3hack.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11akey.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11auth.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11cert.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11cxt.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11err.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11kea.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11list.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11load.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11mech.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11merge.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11nobj.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11obj.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11pars.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11pbe.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11pk12.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11pqg.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11sdr.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11skey.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11slot.o ../pk11wrap/Darwin9.8.0_OPT.OBJ/pk11util.o ../certdb/Darwin9.8.0_OPT.OBJ/alg1485.o ../certdb/Darwin9.8.0_OPT.OBJ/certdb.o ../certdb/Darwin9.8.0_OPT.OBJ/certv3.o ../certdb/Darwin9.8.0_OPT.OBJ/certxutl.o ../certdb/Darwin9.8.0_OPT.OBJ/crl.o ../certdb/Darwin9.8.0_OPT.OBJ/genname.o ../certdb/Darwin9.8.0_OPT.OBJ/stanpcertdb.o ../certdb/Darwin9.8.0_OPT.OBJ/polcyxtn.o ../certdb/Darwin9.8.0_OPT.OBJ/secname.o ../certdb/Darwin9.8.0_OPT.OBJ/xauthkid.o ../certdb/Darwin9.8.0_OPT.OBJ/xbsconst.o ../certdb/Darwin9.8.0_OPT.OBJ/xconst.o ../pki/Darwin9.8.0_OPT.OBJ/asymmkey.o ../pki/Darwin9.8.0_OPT.OBJ/certificate.o ../pki/Darwin9.8.0_OPT.OBJ/cryptocontext.o ../pki/Darwin9.8.0_OPT.OBJ/symmkey.o ../pki/Darwin9.8.0_OPT.OBJ/trustdomain.o ../pki/Darwin9.8.0_OPT.OBJ/tdcache.o ../pki/Darwin9.8.0_OPT.OBJ/certdecode.o ../pki/Darwin9.8.0_OPT.OBJ/pkistore.o ../pki/Darwin9.8.0_OPT.OBJ/pkibase.o ../pki/Darwin9.8.0_OPT.OBJ/pki3hack.o ../dev/Darwin9.8.0_OPT.OBJ/devslot.o ../dev/Darwin9.8.0_OPT.OBJ/devtoken.o ../dev/Darwin9.8.0_OPT.OBJ/devutil.o ../dev/Darwin9.8.0_OPT.OBJ/ckhelper.o ../base/Darwin9.8.0_OPT.OBJ/arena.o ../base/Darwin9.8.0_OPT.OBJ/error.o ../base/Darwin9.8.0_OPT.OBJ/errorval.o ../base/Darwin9.8.0_OPT.OBJ/hashops.o ../base/Darwin9.8.0_OPT.OBJ/libc.o ../base/Darwin9.8.0_OPT.OBJ/tracker.o ../base/Darwin9.8.0_OPT.OBJ/item.o ../base/Darwin9.8.0_OPT.OBJ/utf8.o ../base/Darwin9.8.0_OPT.OBJ/list.o ../base/Darwin9.8.0_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Darwin9.8.0_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Darwin9.8.0_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Darwin9.8.0_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Darwin9.8.0_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Darwin9.8.0_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Darwin9.8.0_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Darwin9.8.0_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Darwin9.8.0_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Darwin9.8.0_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Darwin9.8.0_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Darwin9.8.0_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Darwin9.8.0_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Darwin9.8.0_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Darwin9.8.0_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Darwin9.8.0_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Darwin9.8.0_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Darwin9.8.0_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Darwin9.8.0_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Darwin9.8.0_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Darwin9.8.0_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Darwin9.8.0_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Darwin9.8.0_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Darwin9.8.0_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Darwin9.8.0_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Darwin9.8.0_OPT.OBJ/pkix_pl_socket.o   -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
chmod +x Darwin9.8.0_OPT.OBJ/libnss3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/nss.def Darwin9.8.0_OPT.OBJ/libnss3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libnss3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd ssl; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/derive.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derive.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dtlscon.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dtlscon.c
dtlscon.c: In function 'ssl3_DisableNonDTLSSuites':
dtlscon.c:92: warning: unused variable 'rv'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/prelib.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  prelib.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssl3con.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3con.c
ssl3con.c: In function 'ssl3_HandleHandshakeMessage':
ssl3con.c:8347: warning: 'desc' may be used uninitialized in this function
ssl3con.c: In function 'ssl3_HandleRecord':
ssl3con.c:9575: warning: 'dtls_seq_num' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssl3gthr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3gthr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslauth.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslauth.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslcon.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslcon.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssldef.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssldef.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslenum.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslenum.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslerr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslerrstrs.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerrstrs.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslinit.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinit.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssl3ext.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ext.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslgathr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslgathr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslmutex.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslmutex.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslnonce.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslnonce.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslreveal.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslreveal.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslsecur.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsecur.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslsnce.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsnce.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslsock.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsock.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssltrace.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssltrace.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslver.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/authcert.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  authcert.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmpcert.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmpcert.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sslinfo.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinfo.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssl3ecc.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ecc.c
ssl3ecc.c: In function 'ssl3_DisableECCSuites':
ssl3ecc.c:902: warning: unused variable 'rv'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/unix_err.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  unix_err.c
rm -f Darwin9.8.0_OPT.OBJ/libssl.a
ar cr Darwin9.8.0_OPT.OBJ/libssl.a Darwin9.8.0_OPT.OBJ/derive.o Darwin9.8.0_OPT.OBJ/dtlscon.o Darwin9.8.0_OPT.OBJ/prelib.o Darwin9.8.0_OPT.OBJ/ssl3con.o Darwin9.8.0_OPT.OBJ/ssl3gthr.o Darwin9.8.0_OPT.OBJ/sslauth.o Darwin9.8.0_OPT.OBJ/sslcon.o Darwin9.8.0_OPT.OBJ/ssldef.o Darwin9.8.0_OPT.OBJ/sslenum.o Darwin9.8.0_OPT.OBJ/sslerr.o Darwin9.8.0_OPT.OBJ/sslerrstrs.o Darwin9.8.0_OPT.OBJ/sslinit.o Darwin9.8.0_OPT.OBJ/ssl3ext.o Darwin9.8.0_OPT.OBJ/sslgathr.o Darwin9.8.0_OPT.OBJ/sslmutex.o Darwin9.8.0_OPT.OBJ/sslnonce.o Darwin9.8.0_OPT.OBJ/sslreveal.o Darwin9.8.0_OPT.OBJ/sslsecur.o Darwin9.8.0_OPT.OBJ/sslsnce.o Darwin9.8.0_OPT.OBJ/sslsock.o Darwin9.8.0_OPT.OBJ/ssltrace.o Darwin9.8.0_OPT.OBJ/sslver.o Darwin9.8.0_OPT.OBJ/authcert.o Darwin9.8.0_OPT.OBJ/cmpcert.o Darwin9.8.0_OPT.OBJ/sslinfo.o Darwin9.8.0_OPT.OBJ/ssl3ecc.o Darwin9.8.0_OPT.OBJ/unix_err.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libssl.a(ssltrace.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libssl.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libssl.a(ssltrace.o) has no symbols
grep -v ';+' ssl.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/ssl.def
rm -f Darwin9.8.0_OPT.OBJ/libssl3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libssl3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libssl3.dylib Darwin9.8.0_OPT.OBJ/derive.o Darwin9.8.0_OPT.OBJ/dtlscon.o Darwin9.8.0_OPT.OBJ/prelib.o Darwin9.8.0_OPT.OBJ/ssl3con.o Darwin9.8.0_OPT.OBJ/ssl3gthr.o Darwin9.8.0_OPT.OBJ/sslauth.o Darwin9.8.0_OPT.OBJ/sslcon.o Darwin9.8.0_OPT.OBJ/ssldef.o Darwin9.8.0_OPT.OBJ/sslenum.o Darwin9.8.0_OPT.OBJ/sslerr.o Darwin9.8.0_OPT.OBJ/sslerrstrs.o Darwin9.8.0_OPT.OBJ/sslinit.o Darwin9.8.0_OPT.OBJ/ssl3ext.o Darwin9.8.0_OPT.OBJ/sslgathr.o Darwin9.8.0_OPT.OBJ/sslmutex.o Darwin9.8.0_OPT.OBJ/sslnonce.o Darwin9.8.0_OPT.OBJ/sslreveal.o Darwin9.8.0_OPT.OBJ/sslsecur.o Darwin9.8.0_OPT.OBJ/sslsnce.o Darwin9.8.0_OPT.OBJ/sslsock.o Darwin9.8.0_OPT.OBJ/ssltrace.o Darwin9.8.0_OPT.OBJ/sslver.o Darwin9.8.0_OPT.OBJ/authcert.o Darwin9.8.0_OPT.OBJ/cmpcert.o Darwin9.8.0_OPT.OBJ/sslinfo.o Darwin9.8.0_OPT.OBJ/ssl3ecc.o Darwin9.8.0_OPT.OBJ/unix_err.o   ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lz
chmod +x Darwin9.8.0_OPT.OBJ/libssl3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/ssl.def Darwin9.8.0_OPT.OBJ/libssl3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libssl3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd pkcs12; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12local.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12local.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12creat.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12creat.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12dec.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12dec.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12plcy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12plcy.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12tmpl.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12tmpl.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12e.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12e.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p12d.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12d.c
p12d.c: In function 'SEC_PKCS12DecoderImportBags':
p12d.c:2888: warning: 'keyUsage' may be used uninitialized in this function
rm -f Darwin9.8.0_OPT.OBJ/libpkcs12.a
ar cr Darwin9.8.0_OPT.OBJ/libpkcs12.a Darwin9.8.0_OPT.OBJ/p12local.o Darwin9.8.0_OPT.OBJ/p12creat.o Darwin9.8.0_OPT.OBJ/p12dec.o Darwin9.8.0_OPT.OBJ/p12plcy.o Darwin9.8.0_OPT.OBJ/p12tmpl.o Darwin9.8.0_OPT.OBJ/p12e.o Darwin9.8.0_OPT.OBJ/p12d.o
ranlib Darwin9.8.0_OPT.OBJ/libpkcs12.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd pkcs7; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certread.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certread.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7common.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7common.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7create.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7create.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7decode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7decode.c
p7decode.c: In function 'sec_pkcs7_decoder_get_recipient_key':
p7decode.c:410: warning: unused variable 'bulkLength'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7encode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7encode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7local.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7local.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secmime.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secmime.c
rm -f Darwin9.8.0_OPT.OBJ/libpkcs7.a
ar cr Darwin9.8.0_OPT.OBJ/libpkcs7.a Darwin9.8.0_OPT.OBJ/certread.o Darwin9.8.0_OPT.OBJ/p7common.o Darwin9.8.0_OPT.OBJ/p7create.o Darwin9.8.0_OPT.OBJ/p7decode.o Darwin9.8.0_OPT.OBJ/p7encode.o Darwin9.8.0_OPT.OBJ/p7local.o Darwin9.8.0_OPT.OBJ/secmime.o
ranlib Darwin9.8.0_OPT.OBJ/libpkcs7.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd smime; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsarray.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsarray.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsasn1.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsasn1.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsattr.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsattr.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmscinfo.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscinfo.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmscipher.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscipher.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsdecode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdecode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsdigdata.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigdata.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsdigest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsencdata.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencdata.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsencode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsenvdata.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsenvdata.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsmessage.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsmessage.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmspubkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmspubkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsrecinfo.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsrecinfo.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsreclist.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsreclist.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmssigdata.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssigdata.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmssiginfo.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssiginfo.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsudf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsudf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/smimemessage.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimemessage.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/smimeutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimeutil.c
smimeutil.c: In function 'NSS_SMIMEUtil_FindBulkAlgForRecipients':
smimeutil.c:427: warning: 'key_type' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/smimever.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimever.c
rm -f Darwin9.8.0_OPT.OBJ/libsmime.a
ar cr Darwin9.8.0_OPT.OBJ/libsmime.a Darwin9.8.0_OPT.OBJ/cmsarray.o Darwin9.8.0_OPT.OBJ/cmsasn1.o Darwin9.8.0_OPT.OBJ/cmsattr.o Darwin9.8.0_OPT.OBJ/cmscinfo.o Darwin9.8.0_OPT.OBJ/cmscipher.o Darwin9.8.0_OPT.OBJ/cmsdecode.o Darwin9.8.0_OPT.OBJ/cmsdigdata.o Darwin9.8.0_OPT.OBJ/cmsdigest.o Darwin9.8.0_OPT.OBJ/cmsencdata.o Darwin9.8.0_OPT.OBJ/cmsencode.o Darwin9.8.0_OPT.OBJ/cmsenvdata.o Darwin9.8.0_OPT.OBJ/cmsmessage.o Darwin9.8.0_OPT.OBJ/cmspubkey.o Darwin9.8.0_OPT.OBJ/cmsrecinfo.o Darwin9.8.0_OPT.OBJ/cmsreclist.o Darwin9.8.0_OPT.OBJ/cmssigdata.o Darwin9.8.0_OPT.OBJ/cmssiginfo.o Darwin9.8.0_OPT.OBJ/cmsudf.o Darwin9.8.0_OPT.OBJ/cmsutil.o Darwin9.8.0_OPT.OBJ/smimemessage.o Darwin9.8.0_OPT.OBJ/smimeutil.o Darwin9.8.0_OPT.OBJ/smimever.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libsmime.a(smimemessage.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libsmime.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libsmime.a(smimemessage.o) has no symbols
grep -v ';+' smime.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/smime.def
rm -f Darwin9.8.0_OPT.OBJ/libsmime3.dylib
gcc -arch i386 -dynamiclib -compatibility_version 1 -current_version 1 -install_name @executable_path/libsmime3.dylib -headerpad_max_install_names  -o Darwin9.8.0_OPT.OBJ/libsmime3.dylib Darwin9.8.0_OPT.OBJ/cmsarray.o Darwin9.8.0_OPT.OBJ/cmsasn1.o Darwin9.8.0_OPT.OBJ/cmsattr.o Darwin9.8.0_OPT.OBJ/cmscinfo.o Darwin9.8.0_OPT.OBJ/cmscipher.o Darwin9.8.0_OPT.OBJ/cmsdecode.o Darwin9.8.0_OPT.OBJ/cmsdigdata.o Darwin9.8.0_OPT.OBJ/cmsdigest.o Darwin9.8.0_OPT.OBJ/cmsencdata.o Darwin9.8.0_OPT.OBJ/cmsencode.o Darwin9.8.0_OPT.OBJ/cmsenvdata.o Darwin9.8.0_OPT.OBJ/cmsmessage.o Darwin9.8.0_OPT.OBJ/cmspubkey.o Darwin9.8.0_OPT.OBJ/cmsrecinfo.o Darwin9.8.0_OPT.OBJ/cmsreclist.o Darwin9.8.0_OPT.OBJ/cmssigdata.o Darwin9.8.0_OPT.OBJ/cmssiginfo.o Darwin9.8.0_OPT.OBJ/cmsudf.o Darwin9.8.0_OPT.OBJ/cmsutil.o Darwin9.8.0_OPT.OBJ/smimemessage.o Darwin9.8.0_OPT.OBJ/smimeutil.o Darwin9.8.0_OPT.OBJ/smimever.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12local.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12creat.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12dec.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12plcy.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12tmpl.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12e.o ../pkcs12/Darwin9.8.0_OPT.OBJ/p12d.o ../pkcs7/Darwin9.8.0_OPT.OBJ/certread.o ../pkcs7/Darwin9.8.0_OPT.OBJ/p7common.o ../pkcs7/Darwin9.8.0_OPT.OBJ/p7create.o ../pkcs7/Darwin9.8.0_OPT.OBJ/p7decode.o ../pkcs7/Darwin9.8.0_OPT.OBJ/p7encode.o ../pkcs7/Darwin9.8.0_OPT.OBJ/p7local.o ../pkcs7/Darwin9.8.0_OPT.OBJ/secmime.o   -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
chmod +x Darwin9.8.0_OPT.OBJ/libsmime3.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/smime.def Darwin9.8.0_OPT.OBJ/libsmime3.dylib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libsmime3.dylib ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd crmf; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmfenc.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfenc.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmftmpl.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmftmpl.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmfreq.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfreq.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmfpop.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfpop.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmfdec.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfdec.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmfget.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfget.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmfcont.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfcont.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmmfasn1.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfasn1.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmmfresp.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfresp.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmmfrec.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfrec.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmmfchal.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfchal.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/servget.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  servget.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/encutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  encutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/respcli.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcli.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/respcmn.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcmn.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/challcli.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  challcli.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/asn1cmn.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  asn1cmn.c
rm -f Darwin9.8.0_OPT.OBJ/libcrmf.a
ar cr Darwin9.8.0_OPT.OBJ/libcrmf.a Darwin9.8.0_OPT.OBJ/crmfenc.o Darwin9.8.0_OPT.OBJ/crmftmpl.o Darwin9.8.0_OPT.OBJ/crmfreq.o Darwin9.8.0_OPT.OBJ/crmfpop.o Darwin9.8.0_OPT.OBJ/crmfdec.o Darwin9.8.0_OPT.OBJ/crmfget.o Darwin9.8.0_OPT.OBJ/crmfcont.o Darwin9.8.0_OPT.OBJ/cmmfasn1.o Darwin9.8.0_OPT.OBJ/cmmfresp.o Darwin9.8.0_OPT.OBJ/cmmfrec.o Darwin9.8.0_OPT.OBJ/cmmfchal.o Darwin9.8.0_OPT.OBJ/servget.o Darwin9.8.0_OPT.OBJ/encutil.o Darwin9.8.0_OPT.OBJ/respcli.o Darwin9.8.0_OPT.OBJ/respcmn.o Darwin9.8.0_OPT.OBJ/challcli.o Darwin9.8.0_OPT.OBJ/asn1cmn.o
ranlib Darwin9.8.0_OPT.OBJ/libcrmf.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libcrmf.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd jar; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jarver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarver.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jarsign.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarsign.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jar.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jar-ds.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar-ds.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jarfile.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarfile.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/jarint.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarint.c
rm -f Darwin9.8.0_OPT.OBJ/libjar.a
ar cr Darwin9.8.0_OPT.OBJ/libjar.a Darwin9.8.0_OPT.OBJ/jarver.o Darwin9.8.0_OPT.OBJ/jarsign.o Darwin9.8.0_OPT.OBJ/jar.o Darwin9.8.0_OPT.OBJ/jar-ds.o Darwin9.8.0_OPT.OBJ/jarfile.o Darwin9.8.0_OPT.OBJ/jarint.o
ranlib Darwin9.8.0_OPT.OBJ/libjar.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libjar.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd ckfw; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crypto.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  crypto.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/find.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  find.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/hash.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/instance.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  instance.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/mutex.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mutex.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/object.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  object.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/session.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  session.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sessobj.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  sessobj.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/slot.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  slot.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/token.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  token.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/wrap.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  wrap.c
wrap.c: In function 'NSSCKFWC_Initialize':
wrap.c:151: warning: 'locking_state' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/mechanism.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mechanism.c
rm -f Darwin9.8.0_OPT.OBJ/libnssckfw.a
ar cr Darwin9.8.0_OPT.OBJ/libnssckfw.a Darwin9.8.0_OPT.OBJ/crypto.o Darwin9.8.0_OPT.OBJ/find.o Darwin9.8.0_OPT.OBJ/hash.o Darwin9.8.0_OPT.OBJ/instance.o Darwin9.8.0_OPT.OBJ/mutex.o Darwin9.8.0_OPT.OBJ/object.o Darwin9.8.0_OPT.OBJ/session.o Darwin9.8.0_OPT.OBJ/sessobj.o Darwin9.8.0_OPT.OBJ/slot.o Darwin9.8.0_OPT.OBJ/token.o Darwin9.8.0_OPT.OBJ/wrap.o Darwin9.8.0_OPT.OBJ/mechanism.o
ranlib Darwin9.8.0_OPT.OBJ/libnssckfw.a
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libnssckfw.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd builtins; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/anchor.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  anchor.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/constants.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  constants.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/bfind.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bfind.c
bfind.c: In function 'nss_builtins_FindObjectsInit':
bfind.c:122: warning: 'data' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/binst.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  binst.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/bobject.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bobject.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/bsession.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bsession.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/bslot.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bslot.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/btoken.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  btoken.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certdata.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  certdata.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ckbiver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  ckbiver.c
grep -v ';+' nssckbi.def | grep -v ';-' | sed -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,,' -e 's,^,_,' > Darwin9.8.0_OPT.OBJ/nssckbi.def
rm -f Darwin9.8.0_OPT.OBJ/libnssckbi.dylib
gcc -arch i386 -bundle  -o Darwin9.8.0_OPT.OBJ/libnssckbi.dylib Darwin9.8.0_OPT.OBJ/anchor.o Darwin9.8.0_OPT.OBJ/constants.o Darwin9.8.0_OPT.OBJ/bfind.o Darwin9.8.0_OPT.OBJ/binst.o Darwin9.8.0_OPT.OBJ/bobject.o Darwin9.8.0_OPT.OBJ/bsession.o Darwin9.8.0_OPT.OBJ/bslot.o Darwin9.8.0_OPT.OBJ/btoken.o Darwin9.8.0_OPT.OBJ/certdata.o Darwin9.8.0_OPT.OBJ/ckbiver.o   ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a  -L../../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
chmod +x Darwin9.8.0_OPT.OBJ/libnssckbi.dylib
nmedit -s Darwin9.8.0_OPT.OBJ/nssckbi.def Darwin9.8.0_OPT.OBJ/libnssckbi.dylib
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/libnssckbi.dylib ../../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd cmd; make libs
cd lib; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/basicutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  basicutil.c
basicutil.c: In function 'SECU_PrintAsHex':
basicutil.c:237: warning: 'column' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secpwd.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secpwd.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/derprint.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derprint.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/moreoids.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  moreoids.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pppolicy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pppolicy.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ffs.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ffs.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11table.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11table.c
rm -f Darwin9.8.0_OPT.OBJ/libsectool.a
ar cr Darwin9.8.0_OPT.OBJ/libsectool.a Darwin9.8.0_OPT.OBJ/basicutil.o Darwin9.8.0_OPT.OBJ/secutil.o Darwin9.8.0_OPT.OBJ/secpwd.o Darwin9.8.0_OPT.OBJ/derprint.o Darwin9.8.0_OPT.OBJ/moreoids.o Darwin9.8.0_OPT.OBJ/pppolicy.o Darwin9.8.0_OPT.OBJ/ffs.o Darwin9.8.0_OPT.OBJ/pk11table.o
ranlib: file: Darwin9.8.0_OPT.OBJ/libsectool.a(ffs.o) has no symbols
ranlib Darwin9.8.0_OPT.OBJ/libsectool.a
ranlib: file: Darwin9.8.0_OPT.OBJ/libsectool.a(ffs.o) has no symbols
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 664 Darwin9.8.0_OPT.OBJ/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib
cd addbuiltin; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/addbuiltin.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  addbuiltin.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/addbuiltin -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/addbuiltin.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/addbuiltin ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd atob; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/atob.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  atob.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/atob -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/atob.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/atob ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd bltest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/blapitest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  blapitest.c
blapitest.c: In function 'main':
blapitest.c:3586: warning: 'ret' is used uninitialized in this function
blapitest.c:3479: warning: 'cipherInfo' may be used uninitialized in this function
blapitest.c:3476: warning: 'totalTime' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/bltest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Darwin9.8.0_OPT.OBJ/blapitest.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/bltest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd btoa; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/btoa.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  btoa.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/btoa -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/btoa.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/btoa ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd certcgi; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certcgi.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  certcgi.c
certcgi.c: In function 'get_serial_number':
certcgi.c:594: warning: this decimal constant is unsigned only in ISO C90
certcgi.c: In function 'MakeGeneralName':
certcgi.c:1362: warning: 'value' may be used uninitialized in this function
certcgi.c: In function 'main':
certcgi.c:448: warning: 'keySizeInBits' may be used uninitialized in this function
certcgi.c: At top level:
certcgi.c:365: warning: 'update_data_by_name' defined but not used
certcgi.c:392: warning: 'update_data_by_index' defined but not used
certcgi.c:408: warning: 'add_field' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certcgi -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/certcgi.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/certcgi ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd certutil; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certext.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certext.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/keystuff.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  keystuff.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certutil -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/certext.o Darwin9.8.0_OPT.OBJ/certutil.o Darwin9.8.0_OPT.OBJ/keystuff.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/certutil ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd checkcert; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/checkcert.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  checkcert.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/checkcert -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/checkcert.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/checkcert ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd chktest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/chktest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  chktest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/chktest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/chktest.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/chktest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd crlutil; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crlgen_lex.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen_lex.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crlgen.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen.c
crlgen.c: In function 'crlgen_CreateReasonCode':
crlgen.c:548: warning: 'mark' may be used uninitialized in this function
crlgen.c: In function 'crlgen_CreateInvalidityDate':
crlgen.c:598: warning: 'mark' may be used uninitialized in this function
crlgen.c: In function 'crlgen_updateCrlFn_cert':
crlgen.c:994: warning: 'mark' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crlutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlutil.c
crlutil.c: In function 'main':
crlutil.c:677: warning: 'rv' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crlutil -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/crlgen_lex.o Darwin9.8.0_OPT.OBJ/crlgen.o Darwin9.8.0_OPT.OBJ/crlutil.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/crlutil ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd crmftest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/testcrmf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  testcrmf.c
testcrmf.c:942: warning: 'mapWrapKeyType' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/crmftest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Darwin9.8.0_OPT.OBJ/testcrmf.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcrmf.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/crmftest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd dbtest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dbtest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dbtest.c
../modutil/error.h:136: warning: 'msgStrings' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dbtest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/dbtest.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/dbtest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd derdump; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/derdump.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  derdump.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/derdump -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/derdump.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/derdump ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd digest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/digest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  digest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/digest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/digest.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/digest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd httpserv; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/httpserv.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  httpserv.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/httpserv -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/httpserv.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/httpserv ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd fipstest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/fipstest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
fipstest.c: In function 'dsa_pqggen_test':
fipstest.c:4238: warning: 'keySizeIndex' may be used uninitialized in this function
fipstest.c: In function 'tdea_kat_mmt':
fipstest.c:291: warning: 'mode' may be used uninitialized in this function
fipstest.c: In function 'aes_kat_mmt':
fipstest.c:1003: warning: 'keysize' may be used uninitialized in this function
fipstest.c:1000: warning: 'mode' may be used uninitialized in this function
fipstest.c: In function 'aes_ecb_mct':
fipstest.c:1200: warning: 'keysize' may be used uninitialized in this function
fipstest.c: In function 'aes_cbc_mct':
fipstest.c:1483: warning: 'keysize' may be used uninitialized in this function
fipstest.c: In function 'ecdsa_pkv_test':
fipstest.c:2106: warning: 'len' may be used uninitialized in this function
fipstest.c: In function 'ecdsa_sigver_test':
fipstest.c:2364: warning: 'olen' may be used uninitialized in this function
fipstest.c:2363: warning: 'flen' may be used uninitialized in this function
fipstest.c: In function 'rng_vst':
fipstest.c:2993: warning: 'b' may be used uninitialized in this function
fipstest.c: In function 'rng_mct':
fipstest.c:3116: warning: 'b' may be used uninitialized in this function
fipstest.c: In function 'sha_test':
fipstest.c:3420: warning: 'msgLen' may be used uninitialized in this function
fipstest.c:3419: warning: 'MDlen' may be used uninitialized in this function
fipstest.c: In function 'hmac_test':
fipstest.c:3597: warning: 'keyLen' may be used uninitialized in this function
fipstest.c:3608: warning: 'hash_alg' may be used uninitialized in this function
fipstest.c:3602: warning: 'HMACLen' may be used uninitialized in this function
fipstest.c:3603: warning: 'TLen' may be used uninitialized in this function
fipstest.c: In function 'dsa_pqgver_test':
fipstest.c:3905: warning: 'pghSize' may be used uninitialized in this function
fipstest.c: At top level:
fipstest.c:2541: warning: 'alloc_value' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/fipstest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Darwin9.8.0_OPT.OBJ/fipstest.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/fipstest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd listsuites; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/listsuites.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  listsuites.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/listsuites -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/listsuites.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/listsuites ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd makepqg; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/makepqg.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  makepqg.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/makepqg -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/makepqg.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/makepqg ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd multinit; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/multinit.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   multinit.c
multinit.c:321: warning: 'appendItem' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/multinit -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   Darwin9.8.0_OPT.OBJ/multinit.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/multinit ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd ocspclnt; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ocspclnt.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  ocspclnt.c
ocspclnt.c: In function 'main':
ocspclnt.c:964: warning: 'cert_usage' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ocspclnt -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/ocspclnt.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/ocspclnt ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd ocspresp; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ocspresp.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  ocspresp.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ocspresp -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/ocspresp.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/ocspresp ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd oidcalc; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/oidcalc.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  oidcalc.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/oidcalc -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/oidcalc.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/oidcalc ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd p7content; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7content.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7content.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7content -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/p7content.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/p7content ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd p7env; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7env.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7env.c
p7env.c: In function 'main':
p7env.c:72: warning: 'rv' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7env -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/p7env.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/p7env ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd p7sign; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7sign.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7sign.c
p7sign.c: In function 'main':
p7sign.c:152: warning: 'cert' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7sign -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/p7sign.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/p7sign ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd p7verify; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7verify.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7verify.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/p7verify -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/p7verify.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/p7verify ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd pk12util; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk12util.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk12util.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk12util -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/pk12util.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/pk12util ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd pk11mode; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11mode.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk11mode.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11mode -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/pk11mode.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/pk11mode ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd pk1sign; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk1sign.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk1sign.c
pk1sign.c: In function 'main':
pk1sign.c:177: warning: 'cert' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk1sign -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/pk1sign.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/pk1sign ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd pkix-errcodes; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix-errcodes.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pkix-errcodes.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pkix-errcodes -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/pkix-errcodes.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/pkix-errcodes ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd pp; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pp.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  pp.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pp -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/pp.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/pp ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd pwdecrypt; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pwdecrypt.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pwdecrypt.c
pwdecrypt.c: In function 'doDecrypt':
pwdecrypt.c:140: warning: unused variable 'i'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pwdecrypt -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/pwdecrypt.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/pwdecrypt ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd rsaperf; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/rsaperf.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  rsaperf.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/defkey.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  defkey.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/rsaperf -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/rsaperf.o Darwin9.8.0_OPT.OBJ/defkey.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/rsaperf ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd sdrtest; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sdrtest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  sdrtest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sdrtest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/sdrtest.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/sdrtest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd selfserv; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/selfserv.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  selfserv.c
selfserv.c: In function 'logger':
selfserv.c:729: warning: pointer targets in passing argument 1 of 'PR_AtomicSet' differ in signedness
selfserv.c:730: warning: pointer targets in passing argument 1 of 'PR_AtomicSet' differ in signedness
selfserv.c: In function 'handle_connection':
selfserv.c:1344: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness
selfserv.c:1345: warning: pointer targets in passing argument 1 of 'PR_AtomicIncrement' differ in signedness
selfserv.c:1354: warning: pointer targets in passing argument 1 of 'PR_AtomicDecrement' differ in signedness
selfserv.c: In function 'do_accepts':
selfserv.c:1439: warning: pointer targets in passing argument 1 of 'PR_AtomicIncrement' differ in signedness
selfserv.c: In function 'logWritev':
selfserv.c:1553: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness
selfserv.c: In function 'logWrite':
selfserv.c:1566: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness
selfserv.c: In function 'logSend':
selfserv.c:1583: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/selfserv -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/selfserv.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/selfserv ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd signtool; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/signtool.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  signtool.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/certgen.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  certgen.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/javascript.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  javascript.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/list.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  list.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/sign.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  sign.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/util.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  util.c
util.c: In function 'XP_GetString':
util.c:21: warning: return discards qualifiers from pointer target type
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/verify.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  verify.c
verify.c: In function 'VerifyJar':
verify.c:55: warning: assignment discards qualifiers from pointer target type
verify.c: In function 'JarWho':
verify.c:286: warning: assignment discards qualifiers from pointer target type
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/zip.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  zip.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/signtool -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/signtool.o Darwin9.8.0_OPT.OBJ/certgen.o Darwin9.8.0_OPT.OBJ/javascript.o Darwin9.8.0_OPT.OBJ/list.o Darwin9.8.0_OPT.OBJ/sign.o Darwin9.8.0_OPT.OBJ/util.o Darwin9.8.0_OPT.OBJ/verify.o Darwin9.8.0_OPT.OBJ/zip.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libjar.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lz
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/signtool ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd signver; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/signver.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  signver.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk7print.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk7print.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/signver -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/signver.o Darwin9.8.0_OPT.OBJ/pk7print.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/signver ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd shlibsign; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/shlibsign.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  shlibsign.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/shlibsign -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Darwin9.8.0_OPT.OBJ/shlibsign.o   -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/shlibsign ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd mangle; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/mangle.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  mangle.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/mangle -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DSHLIB_SUFFIX=\"dylib\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  Darwin9.8.0_OPT.OBJ/mangle.o   -L../../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/mangle ../../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd Darwin9.8.0_OPT.OBJ ; sh "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ" \
"/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Darwin9.8.0_OPT.OBJ" Darwin \
"/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib" "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.dylib"
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Darwin9.8.0_OPT.OBJ/shlibsign -v -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.dylib
Library File: ../../../security/nss/lib/softoken/Darwin9.8.0_OPT.OBJ/libsoftokn3.dylib 295040 bytes
Check File: ../../../security/nss/lib/softoken/Darwin9.8.0_OPT.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
  hash: 32 bytes
    dd a8 76 b5 88 3b 9d 34 3b 6f
    0d 1f 27 df aa 59 bd 31 0b 48
    e2 69 f5 97 15 d0 d2 36 77 ef
    77 7e
  signature: 64 bytes
    68 22 04 05 86 8a f5 ee 88 a1
    3a 24 a3 fd 76 f6 80 89 29 dc
    68 9a 22 90 93 ee d6 9e a8 fe
    b0 ed 15 98 6d 5a db 4c 76 d3
    f7 2a ad 8f 01 d6 16 18 44 1f
    f1 20 dc e5 eb 35 bd a9 ce f8
    19 f3 99 02
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd Darwin9.8.0_OPT.OBJ ; sh "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ" \
"/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Darwin9.8.0_OPT.OBJ" Darwin \
"/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib" "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.dylib"
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Darwin9.8.0_OPT.OBJ/shlibsign -v -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.dylib
Library File: ../../../security/nss/lib/freebl/Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.dylib 413744 bytes
Check File: ../../../security/nss/lib/freebl/Darwin9.8.0_OPT.OBJ/Darwin_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
  hash: 32 bytes
    26 af b8 8f 8a 2a 00 29 de cd
    be 59 93 1b fb dc 15 d6 5d b0
    1d c0 c9 f0 b7 2d 4b 9e 47 40
    67 87
  signature: 64 bytes
    19 6c 79 57 79 3c 07 a2 8f 3f
    9c 79 fc 67 21 68 90 0e 56 6a
    61 7b 64 75 bc 78 68 c9 ea d3
    21 1a 19 00 16 7b 88 2e 68 ca
    69 e1 94 28 25 62 ab 7e b5 5c
    1a e4 8e 19 fe 6e f2 9b b7 e5
    61 5b eb 85
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd Darwin9.8.0_OPT.OBJ ; sh "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ" \
"/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Darwin9.8.0_OPT.OBJ" Darwin \
"/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib" "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.dylib"
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Darwin9.8.0_OPT.OBJ/shlibsign -v -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.dylib
Library File: ../../../security/nss/lib/softoken/legacydb/Darwin9.8.0_OPT.OBJ/libnssdbm3.dylib 164620 bytes
Check File: ../../../security/nss/lib/softoken/legacydb/Darwin9.8.0_OPT.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
  hash: 32 bytes
    80 c7 46 12 7d 84 03 5a 41 d2
    bd ce fb 3b 23 2d ec a9 91 17
    9e bb 17 c5 9c 14 24 9b 21 91
    00 96
  signature: 64 bytes
    68 08 32 d8 c1 3e e2 6b 18 b1
    26 2e e4 6a e7 e0 07 07 15 53
    ac 28 72 65 a5 ed bd f1 b1 9c
    97 84 4c 61 28 80 ed 4d c5 2b
    43 20 9a f8 ea fc 41 88 0e e4
    ee f0 3e af 88 d9 c5 ab 46 32
    37 ea 90 8e
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd smimetools; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  cmsutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/cmsutil -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/cmsutil.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/cmsutil ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd ssltap; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssltap.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  ssltap.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/ssltap -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/ssltap.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/ssltap ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd strsclnt; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/strsclnt.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  strsclnt.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/strsclnt -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/strsclnt.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/strsclnt ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd symkeyutil; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/symkeyutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  symkeyutil.c
symkeyutil.c: In function 'main':
symkeyutil.c:1018: warning: unused variable 'rv2'
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/symkeyutil -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/symkeyutil.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/symkeyutil ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd tests; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/baddbdir.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  baddbdir.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/baddbdir -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/baddbdir.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/conflict.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  conflict.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/conflict -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/conflict.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dertimetest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dertimetest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/dertimetest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/dertimetest.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/encodeinttest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  encodeinttest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/encodeinttest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/encodeinttest.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nonspr10.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  nonspr10.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/nonspr10 -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/nonspr10.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/remtest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  remtest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/remtest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/remtest.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secmodtest.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  secmodtest.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/secmodtest -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/secmodtest.o \
 ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/baddbdir Darwin9.8.0_OPT.OBJ/conflict Darwin9.8.0_OPT.OBJ/dertimetest Darwin9.8.0_OPT.OBJ/encodeinttest Darwin9.8.0_OPT.OBJ/nonspr10 Darwin9.8.0_OPT.OBJ/remtest Darwin9.8.0_OPT.OBJ/secmodtest ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd tstclnt; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/tstclnt.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  tstclnt.c
tstclnt.c: In function 'main':
tstclnt.c:850: warning: 'ctmp' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/tstclnt -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/tstclnt.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/tstclnt ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd vfychain; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/vfychain.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"dylib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  vfychain.c
vfychain.c: In function 'configureRevocationParams':
vfychain.c:333: warning: 'revFlags' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/vfychain -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"dylib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Darwin9.8.0_OPT.OBJ/vfychain.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/vfychain ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd vfyserv; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/vfyserv.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"dylib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyserv.c
vfyserv.c: In function 'main':
vfyserv.c:513: warning: 'ctmp' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/vfyutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"dylib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyutil.c
vfyutil.c: In function 'myGetClientAuthData':
vfyutil.c:223: warning: 'privKey' may be used uninitialized in this function
vfyutil.c:222: warning: 'cert' may be used uninitialized in this function
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/vfyserv -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"dylib\" -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Darwin9.8.0_OPT.OBJ/vfyserv.o Darwin9.8.0_OPT.OBJ/vfyutil.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/vfyserv ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
cd modutil; make libs
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/modutil.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  modutil.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/pk11.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  pk11.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/instsec.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  instsec.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/install.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/installparse.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  installparse.c
ytab.c: In function 'Pk11Install_yyparse':
ytab.c:219: warning: suggest parentheses around assignment used as truth value
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/install-ds.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install-ds.c
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  lex.Pk11Install_yy.c
lex.Pk11Install_yy.cpp:1066: warning: 'Pkcs11Install_yyunput' defined but not used
gcc -arch i386 -o Darwin9.8.0_OPT.OBJ/modutil -O2 -fPIC -Di386 -Wall -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK  -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Darwin9.8.0_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  Darwin9.8.0_OPT.OBJ/modutil.o Darwin9.8.0_OPT.OBJ/pk11.o Darwin9.8.0_OPT.OBJ/instsec.o Darwin9.8.0_OPT.OBJ/install.o Darwin9.8.0_OPT.OBJ/installparse.o Darwin9.8.0_OPT.OBJ/install-ds.o Darwin9.8.0_OPT.OBJ/lex.Pk11Install_yy.o  ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libjar.a ../../../../dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Darwin9.8.0_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lz
../../../coreconf/nsinstall/Darwin9.8.0_OPT.OBJ/nsinstall -R -m 775 Darwin9.8.0_OPT.OBJ/modutil ../../../../dist/Darwin9.8.0_OPT.OBJ/bin
TB [2012-11-27 17:25:19] NSS - build - 32 bits - OPT PASSED
TB [2012-11-27 17:25:19] ######## NSS - tests - 32 bits - OPT ########
TinderboxPrint:
TB [2012-11-27 17:25:19] $ cd /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests
TB [2012-11-27 17:25:19] $ ./all.sh
testdir is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security
init.sh init: Creating /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security
********************************************
   Platform: Darwin9.8.0_OPT.OBJ
   Results: nss-vm-darwin9-1.1
********************************************

init.sh init: Testing PATH .:/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/bin:/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib:/bin:/usr/bin:/opt/local/bin:/usr/sbin:/sbin:/usr/local/bin:/usr/X11/bin against LIB /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Tue Nov 27 17:25:19 PST 2012
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt  - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt  - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt  - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt  - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt  - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt  - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt  - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt  - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt  - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt  - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt  - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt  - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #13: Camellia ECB Encrypt  - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #14: Camellia ECB Decrypt  - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #15: Camellia CBC Encrypt  - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #16: Camellia CBC Decrypt  - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #17: SEED ECB Encrypt  - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #18: SEED ECB Decrypt  - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #19: SEED CBC Encrypt  - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #20: SEED CBC Decrypt  - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #21: RC2 ECB Encrypt  - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #22: RC2 ECB Decrypt  - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #23: RC2 CBC Encrypt  - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #24: RC2 CBC Decrypt  - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #25: RC4 Encrypt  - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #26: RC4 Decrypt  - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #27: RSA Encrypt  - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #28: RSA Decrypt  - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #29: DSA Sign  - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #30: DSA Verify  - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #31: MD2 Hash  - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #32: MD5 Hash  - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #33: SHA1 Hash  - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #34: SHA224 Hash  - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #35: SHA256 Hash  - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #36: SHA384 Hash  - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #37: SHA512 Hash  - PASSED
TIMESTAMP cipher END: Tue Nov 27 17:29:37 PST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 17:29:37 PST 2012
lowhash.sh: Lowhash Tests ===============================
freebl lowhash not supported in this plaform.
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 17:29:37 PST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Tue Nov 27 17:29:37 PST 2012
TIMESTAMP libpkix END: Tue Nov 27 17:29:37 PST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 17:29:37 PST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #38: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -f ../tests.pw
cert.sh: #39: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #40: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #41: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -o root.cert
cert.sh: #42: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -f ../tests.pw
cert.sh: #43: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #44: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #45: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -o root.cert
cert.sh: #46: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #47: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -o root.cert
cert.sh: #48: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #49: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -o root.cert
cert.sh: #50: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -f ../tests.pw
cert.sh: #51: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #52: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #53: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -o root.cert
cert.sh: #54: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #55: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -o root.cert
cert.sh: #56: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #57: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -o root.cert
cert.sh: #58: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #59: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #60: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #61: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #62: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #63: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #64: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #65: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #66: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #67: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #68: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #69: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #70: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #71: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #72: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -f ../tests.pw
cert.sh: #73: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #74: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #75: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com.cert -f ../tests.pw
cert.sh: #76: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com.cert
cert.sh: #77: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/clientCA.ca.cert
cert.sh: #78: Import Client Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #79: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert -f ../tests.pw
cert.sh: #80: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert
cert.sh: #81: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/clientCA-ec.ca.cert
cert.sh: #82: Import Client EC Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #83: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw
cert.sh: #84: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #85: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/chain-1-serverCA.ca.cert
cert.sh: #87: Import chain-1-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #88: Import chain-2-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/chain-2-serverCA.ca.cert
cert.sh: #89: Import chain-2-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/serverCA-ec.ca.cert
cert.sh: #90: Import serverCA-ec CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/serverCA.ca.cert
cert.sh: #91: Import serverCA CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -f ../tests.pw
cert.sh: #92: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #93: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #94: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #95: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #96: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/serverCA.ca.cert
cert.sh: #97: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #98: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #99: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #100: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA/serverCA-ec.ca.cert
cert.sh: #101: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #102: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #103: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #104: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #105: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/chain-1-clientCA.ca.cert
cert.sh: #106: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #107: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/chain-2-clientCA.ca.cert
cert.sh: #108: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/clientCA-ec.ca.cert
cert.sh: #109: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/clientCA/clientCA.ca.cert
cert.sh: #110: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw
cert.sh: #111: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #112: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -i ../CA/TestCA.ca.cert
cert.sh: #113: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #114: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #115: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #116: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser.cert
cert.sh: #117: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #118: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #119: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #120: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #121: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #122: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #123: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             nss-vm-darwin9-1.community.scl3.mozilla.com ------------------------------------
cert.sh: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw
cert.sh: #124: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB - PASSED
cert.sh: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #125: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB - PASSED
cert.sh: Import Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -i ../CA/TestCA.ca.cert
cert.sh: #126: Import Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Import EC Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #127: Import EC Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #128: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com.cert -f ../tests.pw 
cert.sh: #129: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com.cert
cert.sh: #130: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's Cert Created
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #131: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert -f ../tests.pw 
cert.sh: #132: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert
cert.sh: #133: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #134: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw 
cert.sh: #135: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request with RSA - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #136: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             nss-vm-darwin9-1.community.scl3.mozilla.com-sni --------------------------------
cert.sh: Generate Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #137: Generate Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com.cert -f ../tests.pw 
cert.sh: #138: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Request - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com.cert
cert.sh: #139: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert Created
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #140: Generate EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec.cert -f ../tests.pw 
cert.sh: #141: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec.cert
cert.sh: #142: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #143: Generate mixed EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw 
cert.sh: #144: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request with RSA - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #145: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw
cert.sh: #146: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -f ../tests.pw
cert.sh: #147: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw
cert.sh: #148: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #149: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #150: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #151: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #152: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #153: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #154: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #155: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #156: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #157: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #158: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #159: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #160: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw
cert.sh: #161: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #162: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #163: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #164: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #165: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #166: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #167: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #168: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #169: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #170: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #171: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #172: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #173: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw
cert.sh: #174: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #175: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #176: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #177: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #178: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #179: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw -i Dave.cert
cert.sh: #180: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #181: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #182: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #183: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #184: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #185: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #186: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw
cert.sh: #187: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #188: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #189: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #190: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #191: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #192: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw -i Eve.cert
cert.sh: #193: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #194: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #195: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #196: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #197: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #198: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #199: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #200: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #201: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #202: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #203: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #204: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #205: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #206: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #207: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips -f ../tests.fipspw
cert.sh: #208: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #209: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #210: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #211: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw
cert.sh: #212: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #213: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #214: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #215: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #216: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #217: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #218: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #219: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #220: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #221: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #222: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #223: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #224: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #225: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #226: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #227: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #228: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #229: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #230: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #231: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #232: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #233: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #234: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #235: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #236: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #237: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #238: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #239: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #240: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #241: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #242: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #243: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #244: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #245: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #246: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #247: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #248: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #249: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #250: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #251: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #252: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #253: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #254: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #255: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #256: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #257: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #258: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #259: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #260: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #261: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #262: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #263: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #264: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #265: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #266: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #267: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #268: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #269: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #270: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #271: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #272: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #273: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #274: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #275: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #276: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #277: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #278: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #279: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #280: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #281: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #282: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #283: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #284: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #285: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #286: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #287: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #288: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #289: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #290: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #291: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #292: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #293: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #294: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #295: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #296: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #297: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #298: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #308: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #309: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #310: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #311: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #312: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #313: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #314: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #315: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #316: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #317: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #318: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #319: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #320: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #321: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #322: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #323: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #324: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #325: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #326: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #327: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #328: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #329: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #330: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #331: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #332: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #333: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #334: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #335: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #336: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #337: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #338: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #339: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #340: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #341: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #342: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #343: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #344: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #345: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #346: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #347: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #348: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #349: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #350: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #351: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #352: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #353: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #354: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #355: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #356: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #357: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #358: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #359: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #360: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #361: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #362: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #363: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #364: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #365: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #366: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #367: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #368: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #369: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #370: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #371: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #372: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #373: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #374: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #375: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #376: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #377: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #378: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #379: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #380: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #381: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #382: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #383: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #384: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #385: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #386: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #387: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #388: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #389: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #390: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #391: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #392: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #393: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #394: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #395: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #396: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #397: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #398: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #399: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #400: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #401: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #402: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #403: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #404: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #405: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #406: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #407: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #408: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #409: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #410: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #411: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #412: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #413: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #414: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #415: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #416: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #417: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #418: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #419: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #420: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #421: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #422: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #423: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #424: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw
cert.sh: #425: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #426: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #427: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #428: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #429: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #430: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #431: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #432: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #433: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #434: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #435: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #436: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #437: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:95
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:30 2012
            Not After : Thu Feb 28 01:30:30 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ec:9f:f6:a2:8f:1c:26:6e:04:b0:cc:ec:35:f2:4d:c2:
                    25:23:56:4e:ff:23:ba:47:4d:2b:b1:7e:8f:08:34:1a:
                    63:05:39:f2:55:d8:06:b1:dd:42:7f:ca:cf:68:25:01:
                    d4:1a:08:40:9c:18:46:e4:9b:74:e2:27:85:8c:37:b9:
                    5c:e3:0a:8c:d7:f2:eb:af:ea:19:78:06:ab:78:ff:62:
                    e4:8f:e0:cc:48:4b:19:6d:b7:5d:94:66:37:17:a3:32:
                    3d:b3:64:8e:8d:37:f5:4b:ed:70:fc:bf:a3:dd:0f:60:
                    8c:1e:48:01:8a:0a:7b:42:1a:ef:f3:2a:c0:57:56:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:af:fd:c8:31:9f:d3:1c:c7:f3:1b:50:c3:d0:37:f7:
        ee:dd:d9:f4:28:17:50:73:7d:a4:7d:da:f8:b5:9e:ac:
        c1:d2:47:33:44:8b:56:d9:28:a8:5f:c5:e7:51:22:d0:
        ee:a4:91:b4:e9:a9:0a:8f:12:7f:9f:db:3a:4c:d8:10:
        b7:df:31:9d:6f:04:c8:f5:ff:df:1a:7b:27:79:e5:7d:
        9f:37:58:a0:16:36:ab:d2:11:b2:ec:60:f6:df:ba:9f:
        fe:fd:87:a6:3f:5f:2a:2f:64:d0:d0:d4:81:55:0c:26:
        bd:34:79:5a:76:bf:49:cf:14:92:ac:cb:be:47:e0:76
    Fingerprint (MD5):
        4C:4D:C6:FD:D4:C0:1C:CF:B3:3B:5D:76:B8:0B:06:29
    Fingerprint (SHA1):
        F4:C9:2F:42:8F:94:4D:A4:5D:DC:08:9F:1D:B3:3E:62:60:32:00:CF

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #438: Certificate Key Usage Extension (1) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:97
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:31 2012
            Not After : Thu Feb 28 01:30:31 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e7:68:1b:f2:85:61:92:0b:41:56:c0:34:d5:50:83:d2:
                    91:7a:dc:b9:e0:74:f8:d7:93:cf:f2:26:33:4a:75:52:
                    e2:db:ee:0e:33:eb:67:32:9e:0f:ae:39:e2:87:05:22:
                    e8:d0:09:11:7f:7a:2e:be:64:8c:5f:89:8e:a7:61:6c:
                    23:b1:46:b3:f3:7f:5f:9b:7c:45:df:02:d4:0e:1d:3a:
                    3d:6f:cf:85:73:c0:7a:91:8c:3b:80:6e:8e:8f:62:f6:
                    5b:98:b3:65:86:55:8b:03:e6:da:9b:e7:b9:8c:14:d6:
                    76:8d:0a:ee:a8:8a:c2:6d:98:93:e9:cc:9b:7c:d5:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:1b:83:48:e7:c1:b8:a0:e0:bb:65:14:da:ce:c6:c1:
        df:e5:21:49:af:9b:21:8c:36:f7:b3:fd:5a:fb:06:1c:
        09:e0:4b:22:15:bc:37:56:ad:67:22:eb:d8:c4:bb:bc:
        5f:7d:cc:9f:a9:a7:cf:c1:34:3e:92:8c:2a:75:23:92:
        57:e8:6b:5a:9d:46:83:5f:84:3b:0c:10:37:7a:78:ab:
        dc:05:56:de:2c:ea:e4:2f:56:01:47:58:71:2b:b2:33:
        49:2e:fb:20:b3:12:94:2e:13:91:53:73:30:17:36:40:
        ca:22:64:92:ef:70:14:ed:fd:72:a8:7c:fc:0d:93:ae
    Fingerprint (MD5):
        96:55:44:7F:BA:DD:B6:5A:7B:1B:3C:C2:C4:D9:B8:4F
    Fingerprint (SHA1):
        FA:0A:6E:F8:AE:29:7A:58:B1:EA:21:09:8C:E4:51:B5:8D:06:B1:22

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #439: Certificate Key Usage Extension (2) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:98
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:32 2012
            Not After : Thu Feb 28 01:30:32 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:f9:b1:2e:fd:57:33:ff:4e:c5:7f:e8:d8:6e:b9:8f:
                    7a:ab:c2:03:7d:30:04:1d:90:6e:30:7e:51:0c:da:9b:
                    21:db:78:b4:34:39:47:4b:97:00:95:f7:1b:75:45:e2:
                    dd:8f:4a:8b:54:a2:5a:4e:0d:27:99:bc:46:28:fd:52:
                    a2:c2:6a:32:e1:c5:51:92:5a:03:f3:53:2c:aa:9d:cb:
                    4c:05:b3:51:af:86:7d:2b:4d:ee:a4:d9:68:28:51:9b:
                    10:16:2f:11:d2:1e:73:bf:f3:e7:96:00:6c:39:ed:c9:
                    e7:b7:31:14:67:8f:c5:d9:ac:ce:6c:6d:71:db:1f:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        86:25:bb:8f:28:f3:eb:93:b3:49:55:84:79:88:80:6e:
        15:41:b7:c7:3a:99:02:4f:3f:40:3a:de:17:bf:91:8d:
        3d:42:e5:20:d4:ed:2d:48:2c:98:23:5d:4b:e8:cf:85:
        78:e6:c9:13:a9:21:66:6f:7d:93:76:20:47:c7:15:a1:
        0b:1d:9d:3d:5c:4e:b1:80:d7:68:33:60:c3:4b:9e:7d:
        a5:84:be:da:dc:d5:a9:1b:dc:73:a3:7c:d9:34:48:07:
        68:9b:5f:89:50:90:08:2d:cb:71:a4:d1:b3:c2:1d:68:
        e5:89:77:13:8b:96:eb:c4:4c:b6:0e:e2:f9:38:f7:eb
    Fingerprint (MD5):
        C1:71:76:18:F9:D2:3E:78:53:3D:78:A3:44:CC:7E:7B
    Fingerprint (SHA1):
        1D:9C:99:24:96:A1:CE:24:AE:04:CD:71:06:D2:6A:09:80:C8:B8:C2

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #440: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:99
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:32 2012
            Not After : Thu Feb 28 01:30:32 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:5e:1f:b3:b3:16:e6:ba:e8:e4:d7:d0:c6:98:cd:03:
                    e5:5e:4e:ca:31:7f:e7:eb:99:1c:e2:91:03:63:87:23:
                    c1:0e:08:77:6d:f2:3d:47:ef:07:d5:0f:da:f1:85:3b:
                    5f:82:cd:2a:c5:58:8b:f4:eb:ca:f3:e0:f1:d0:62:2e:
                    94:c5:97:f8:36:6f:bf:0a:7a:71:5c:1d:1f:56:9f:d1:
                    d3:2f:26:2e:a1:8e:7b:94:31:84:2a:f6:84:80:f1:6b:
                    9b:3c:e4:1b:cb:9f:eb:63:76:6f:f6:da:03:1d:19:eb:
                    c2:d9:13:bf:42:b9:3f:70:2e:1a:ef:8a:d8:5c:d9:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        72:06:12:05:b1:17:1c:c4:dc:9b:81:09:93:60:67:5c:
        3c:c8:65:8d:45:55:23:e9:4a:d6:28:8a:c2:86:53:75:
        7b:cf:28:fa:6b:ff:a3:e8:db:f8:26:06:5f:37:1c:7b:
        df:96:08:24:e7:c7:f9:43:35:42:10:00:2b:36:32:80:
        65:e6:37:07:d7:ae:ae:81:63:7b:e5:ae:b1:4c:d5:96:
        90:23:7f:b4:c8:ed:78:5d:b4:11:5d:f8:79:b7:25:a5:
        1b:64:06:ef:dc:cf:98:b8:8e:39:41:24:2c:c4:96:31:
        4c:02:85:55:a1:64:1c:cf:1f:4f:a0:3c:2d:06:fa:45
    Fingerprint (MD5):
        89:98:11:BA:EB:72:10:2C:FC:7B:37:0A:A8:4C:D5:C8
    Fingerprint (SHA1):
        36:CA:0A:CC:7A:43:7C:D2:15:F9:4F:7F:FB:9C:0E:49:21:4B:FB:E2

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #441: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:9a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:33 2012
            Not After : Thu Feb 28 01:30:33 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:79:5b:5e:09:a2:31:17:38:3e:1d:54:6b:64:bd:69:
                    bf:d9:32:5b:65:5e:10:d7:f9:a2:1a:49:ea:37:45:2c:
                    5d:b3:ec:cc:ca:ca:6f:97:b7:8c:2e:e8:26:3c:f7:8e:
                    de:1c:13:78:76:9f:12:5b:c3:e2:19:73:72:ad:3c:10:
                    3a:6a:15:e4:0a:1b:e7:77:68:dc:32:e9:51:af:14:a9:
                    79:fc:f1:44:66:d1:bf:67:3a:1b:c2:3a:af:d4:36:9f:
                    2f:4b:17:9a:2c:a8:1e:17:f6:59:94:16:a7:eb:b6:63:
                    9e:09:f4:9e:79:99:63:dd:68:ab:76:5a:d1:82:eb:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1a:c7:98:4d:73:89:f9:e3:ee:30:da:e6:b9:31:09:82:
        50:e4:43:b6:7c:70:22:c4:df:84:8e:54:b0:9e:bd:85:
        c9:0c:5c:f1:86:8f:28:5d:e8:ea:cb:fc:51:dc:af:73:
        33:a0:47:41:ce:ed:d3:63:83:cf:ec:1c:e7:41:50:24:
        e9:37:ba:59:57:13:17:31:0c:97:f7:9d:93:2e:49:6b:
        3e:82:14:6b:46:db:5f:f7:fb:79:10:ac:c6:cf:12:09:
        02:70:a0:a3:4d:0e:95:f2:b0:23:a6:32:38:8b:82:d7:
        e7:93:c5:66:6b:ab:25:ea:91:a0:7e:18:15:1d:2f:04
    Fingerprint (MD5):
        50:24:0E:F3:33:60:64:A7:29:5F:1A:2E:7E:94:83:2E
    Fingerprint (SHA1):
        15:67:C9:0B:A6:4D:50:79:20:20:8D:7E:C7:57:D6:2A:DB:6E:9C:FF

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #442: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:9b
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:33 2012
            Not After : Thu Feb 28 01:30:33 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:77:e8:63:38:fb:9f:72:5e:6e:09:c8:45:a1:b6:c9:
                    84:59:69:cd:7e:d2:eb:09:ea:13:e6:0f:77:ff:90:55:
                    81:5f:d4:51:6d:36:d2:09:b7:e1:57:a8:ec:17:68:2c:
                    40:9a:e5:e0:d2:4a:8e:e2:e1:ce:bd:9b:a1:04:ac:dd:
                    71:93:71:1f:a7:ea:74:22:ae:b2:6d:3a:ff:85:88:15:
                    13:48:e5:e2:73:e3:bf:cf:be:1e:03:46:23:4c:0f:3a:
                    86:e2:6f:c3:40:ec:be:cc:66:40:70:27:8d:56:2f:bf:
                    a5:7d:78:07:d6:7b:69:6e:89:23:92:14:f0:38:98:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0a:ca:66:8c:1e:8b:83:d0:bb:45:14:b4:01:43:7c:a2:
        98:e4:9f:9c:d6:b1:9a:ff:69:6e:4c:5b:0c:0d:bb:51:
        9c:20:e6:0e:a7:1c:11:d9:f9:41:78:3d:62:48:7c:0a:
        25:d8:ef:14:25:c3:55:70:c9:30:2d:2a:a2:d7:f5:07:
        04:40:23:d5:ef:81:74:02:a0:76:6c:5e:e0:aa:9e:f3:
        10:1e:fd:29:f1:4f:6b:6f:5b:3f:da:4e:b9:57:6a:6a:
        cc:ad:94:0f:8f:48:d2:9e:a2:83:42:3b:fc:ce:60:ac:
        0c:f7:b1:f9:a3:0d:43:f6:1b:97:1a:11:27:2c:d8:1f
    Fingerprint (MD5):
        B6:54:9F:0C:02:70:8F:F8:E9:1B:98:2C:C4:1B:50:E4
    Fingerprint (SHA1):
        58:50:73:3D:58:D5:25:09:C0:0B:53:21:4E:06:30:5A:7E:F8:B7:BF

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #443: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:9c
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:34 2012
            Not After : Thu Feb 28 01:30:34 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:3d:17:69:1b:63:15:12:f1:05:3c:01:d3:45:48:b0:
                    f1:5f:a1:41:3a:e2:f3:a8:4e:fb:be:bd:62:9b:50:8b:
                    69:51:ae:f8:3b:99:d6:ad:a8:7f:5f:c4:43:29:3a:c7:
                    68:a4:1f:f2:26:e4:51:ce:1a:3b:88:8f:65:d3:bd:55:
                    01:f9:01:5b:2d:01:4c:6f:54:73:83:a9:97:1b:46:1c:
                    a1:62:98:7c:0a:ea:c3:4c:a3:7c:3c:c6:0d:db:1a:e1:
                    d7:5b:22:c5:b2:bc:fb:62:27:19:fc:3e:8b:6a:d2:03:
                    32:df:8b:45:ea:44:9c:47:f0:6b:55:22:1f:30:e3:4b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        28:ba:e4:70:de:54:d9:e0:10:17:43:80:77:5b:5c:1e:
        8d:8e:0f:14:19:2c:af:d4:1a:3f:ed:9d:96:95:51:92:
        a7:aa:30:60:a3:78:a0:8c:cb:bd:14:7d:6a:dd:18:d1:
        c0:a5:1a:53:c9:96:fc:05:a7:75:25:b0:31:96:0e:94:
        a8:56:fa:8a:48:94:1a:32:d8:25:51:52:38:9e:39:ff:
        ee:8d:cc:d4:19:3c:a8:e1:79:29:72:dd:07:83:ab:a1:
        e7:85:82:a4:11:c5:da:3b:71:f0:14:58:8b:d5:8f:4f:
        45:65:af:a3:58:10:aa:cf:f3:c8:4a:43:0f:7a:db:d6
    Fingerprint (MD5):
        F4:04:49:65:8D:70:86:D0:19:DE:14:1D:52:C7:FC:5B
    Fingerprint (SHA1):
        42:2F:71:5B:7B:0B:5B:76:C1:B9:7A:E8:E5:E4:88:9B:DF:5A:71:33

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #444: CRL Distribution Points Extension (7) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:9d
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:34 2012
            Not After : Thu Feb 28 01:30:34 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:f9:46:5b:c3:6c:f1:97:7f:29:27:99:e0:d2:99:1b:
                    9a:97:91:0b:28:80:d8:e1:10:65:01:a9:81:dd:3b:19:
                    11:09:c2:00:1f:9c:9f:c2:f7:17:b9:57:c9:59:40:cc:
                    fd:3c:77:45:8d:6a:01:52:d3:34:b7:6d:8b:65:7b:19:
                    a1:94:00:7e:9d:42:25:47:fd:39:09:a9:c6:89:3b:44:
                    f7:1e:9a:89:e8:74:e1:7b:b1:7c:6f:60:48:11:52:31:
                    79:02:76:f2:fe:fe:f1:17:7e:fa:a9:95:67:61:77:bc:
                    97:04:e8:b4:69:4d:1b:58:66:4a:a5:ef:3d:b9:3b:31
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:2f:1f:34:4a:be:58:1a:73:67:d2:39:6c:20:49:fa:
        ae:39:a7:23:38:38:89:7a:8e:f6:77:21:74:59:c6:43:
        3d:d5:82:51:9b:94:34:29:4d:55:6f:6c:e4:bd:6b:11:
        a6:8e:0c:d3:b2:53:10:74:0e:33:09:11:75:e1:39:c8:
        c9:a6:8d:d4:25:95:2e:86:b8:af:24:14:97:78:6c:5d:
        ad:20:59:65:63:f8:bb:65:f1:a6:0b:17:51:25:3b:30:
        11:f2:eb:d8:0a:e9:d6:1f:de:f2:4f:28:0c:f9:50:8e:
        77:19:05:b5:e8:d9:0a:76:37:45:35:6c:e7:64:31:3c
    Fingerprint (MD5):
        15:C0:5C:F0:D2:1C:F3:3F:25:50:DF:83:46:86:02:93
    Fingerprint (SHA1):
        E2:DB:FD:41:39:91:72:42:61:67:EC:7E:46:E5:12:2E:A4:EB:35:05

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #445: CRL Distribution Points Extension (8) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:9e
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:35 2012
            Not After : Thu Feb 28 01:30:35 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    97:9e:be:06:0d:a3:e0:99:fd:34:1e:77:0c:70:77:14:
                    9d:39:0b:96:e0:82:69:32:7d:85:8e:33:5b:e7:84:4a:
                    08:36:3a:41:19:f2:d8:25:b2:df:b1:ff:16:0f:1b:f4:
                    de:c0:a9:9e:12:ad:7d:ce:3e:a5:7f:42:12:74:09:e1:
                    d0:ea:07:00:f6:4e:7e:93:2c:77:90:9f:05:e1:f4:52:
                    52:8e:49:98:8a:fe:83:58:eb:7a:72:ac:7c:07:b0:98:
                    fa:fd:09:46:b7:19:ce:52:0a:8f:d0:62:7b:8f:5c:f6:
                    b3:60:0f:d1:28:78:da:cb:92:49:b2:d8:c2:7c:0c:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5e:2b:71:7f:55:8b:c8:ff:ff:e4:f7:80:85:f6:87:56:
        ba:03:70:01:0d:d4:d1:01:f1:d0:ea:9b:ef:c4:46:e6:
        3d:0e:bf:ab:3d:cb:20:90:82:05:02:eb:c5:89:53:68:
        54:94:8a:ff:45:63:e9:5e:c2:f8:a1:b9:f7:01:d8:d9:
        13:2f:59:f1:e6:69:42:4e:dd:19:1b:fd:86:81:5d:ed:
        83:8e:ee:7d:3b:d0:e6:92:0a:6a:57:1b:15:e1:02:4e:
        43:2f:a4:f6:9b:b1:f9:49:a0:c4:45:30:a5:48:38:23:
        d1:34:f5:a5:cc:30:65:df:07:10:c9:3d:f1:cd:be:3f
    Fingerprint (MD5):
        16:25:63:19:6C:7E:86:4D:FE:B7:9C:3C:F8:18:13:29
    Fingerprint (SHA1):
        07:A9:F0:C9:90:37:4A:95:D9:3D:BA:B6:B8:EE:FC:34:43:E9:0F:3B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #446: Certificate Type Extension (9) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:9f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:36 2012
            Not After : Thu Feb 28 01:30:36 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:69:5f:87:8f:67:89:d2:e9:ef:4f:f6:07:21:0d:e3:
                    77:7b:73:32:e9:8f:09:dc:c7:b1:cd:81:2e:6a:bc:11:
                    e8:e2:31:dd:8b:b8:6f:c9:64:08:a9:7a:d6:77:87:77:
                    c4:c3:af:0d:56:e2:55:17:cb:79:dd:1c:b7:72:0d:e0:
                    e7:e7:ee:df:c1:9e:52:fc:d0:e7:45:aa:66:aa:82:5c:
                    83:b5:63:4e:c5:fd:13:39:31:c7:5d:16:71:8a:fc:8f:
                    87:5a:a8:a1:a2:fa:51:5c:04:35:f5:04:0d:b5:db:0e:
                    c0:79:79:5a:cb:38:93:60:f7:01:08:2b:d6:0f:8d:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        08:70:2d:60:c6:04:eb:d5:fa:27:88:ad:71:1d:b6:3b:
        5e:01:31:d8:13:8a:e1:23:88:af:aa:48:b2:70:36:5a:
        38:5c:40:c9:78:36:70:6f:25:1d:8e:26:c4:c5:c2:5b:
        ab:26:a5:ca:1e:8b:55:86:63:7e:b8:bf:52:f7:f5:fa:
        8a:fe:52:e4:a0:62:70:c1:a3:63:20:79:b1:b0:11:cd:
        e5:0a:10:2f:c2:7f:c4:77:d5:06:36:c7:6b:98:4e:8d:
        27:e3:7a:f1:9d:24:b6:90:a3:e1:b2:2a:ff:b2:02:db:
        26:99:8a:68:e3:92:a2:47:51:08:d2:84:ce:bb:97:95
    Fingerprint (MD5):
        18:7E:A5:A2:3F:D9:D4:FD:AE:B3:E5:C7:D1:57:41:76
    Fingerprint (SHA1):
        87:03:E3:5B:8D:D2:7C:CF:C2:BA:75:AF:3B:33:44:D8:88:75:33:3F

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #447: Extended Key Usage Extension (10) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:83:a1
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:30:36 2012
            Not After : Thu Feb 28 01:30:36 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:ca:16:71:4f:eb:f2:f8:e3:3c:d7:ee:35:ff:83:e9:
                    35:42:44:07:9d:13:c8:9c:d1:95:35:9d:24:7c:f1:21:
                    34:45:c5:f9:0b:be:48:04:af:9f:44:7a:8b:0f:b9:10:
                    72:b3:5f:7d:93:d6:7d:6c:89:ca:fe:4f:e5:ee:b7:59:
                    37:3d:fa:2b:d9:ee:55:1b:87:0a:f3:80:9a:52:c5:fe:
                    d2:62:be:06:c8:b9:bf:ea:0e:55:72:57:1c:19:cc:ea:
                    0a:d4:a7:32:23:c3:af:ed:42:ad:e3:ec:58:28:a7:d9:
                    28:8a:59:60:14:b2:9e:db:39:99:2c:a6:c9:c7:01:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:19:b6:3f:9b:53:c6:8b:00:c0:96:66:31:8c:cf:7b:
        d9:5b:c4:8d:a4:94:b1:75:2a:e8:0f:a6:56:44:93:f5:
        cb:09:b1:6a:7b:a9:9a:a6:e8:7e:f4:50:84:8f:74:5a:
        e0:e0:f4:50:2c:13:ac:2f:1d:7e:45:dd:3e:fd:db:84:
        34:6c:8c:03:d3:4d:9d:31:af:e2:42:ee:02:0e:c9:e9:
        0d:9e:a4:d4:ee:5c:45:cc:a6:8f:5d:91:dc:67:7c:ee:
        8a:1d:40:ce:46:da:71:23:67:21:e2:16:2a:54:e3:ce:
        c9:bb:07:5d:48:b3:c6:f4:b4:ab:bf:6f:9a:29:ef:66
    Fingerprint (MD5):
        79:6C:F1:1C:D2:F4:D5:68:28:37:EC:3B:66:54:8A:2B
    Fingerprint (SHA1):
        9B:B2:CB:D2:30:E6:D6:63:C4:22:6A:4D:B4:D5:B1:D2:44:65:56:DB

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #448: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass -f ../tests.pw
cert.sh: #449: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #450: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #451: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass -o root.cert
cert.sh: #452: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #453: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #454: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #455: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
cert.sh: #456: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #457: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #458: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #459: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #460: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #461: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #462: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #463: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #464: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #465: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #466: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #467: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #468: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
cert.sh: #469: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #470: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -o root.cert
cert.sh: #471: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #472: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #473: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA/req and ./req are identical (not copied).
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #474: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #475: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #476: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #477: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #478: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #479: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #480: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #481: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #482: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #483: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #484: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #485: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #486: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #487: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #488: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #489: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #490: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser40.cert
cert.sh: #491: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #492: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #493: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #494: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #495: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #496: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #497: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #498: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #499: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser41.cert
cert.sh: #500: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #501: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #502: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #503: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #504: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #505: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #506: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #507: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #508: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser42.cert
cert.sh: #509: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #510: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #511: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #512: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #513: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #514: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #515: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #516: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #517: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser43.cert
cert.sh: #518: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #519: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #520: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #521: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #522: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #523: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #524: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #525: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #526: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser44.cert
cert.sh: #527: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #528: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #529: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #530: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #531: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #532: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #533: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #534: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #535: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser45.cert
cert.sh: #536: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #537: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #538: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #539: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #540: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #541: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #542: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #543: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #544: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser46.cert
cert.sh: #545: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #546: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #547: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #548: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #549: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #550: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #551: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #552: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #553: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser47.cert
cert.sh: #554: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #555: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #556: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #557: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #558: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #559: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #560: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #561: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #562: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser48.cert
cert.sh: #563: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #564: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #565: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #566: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #567: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #568: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #569: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #570: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #571: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser49.cert
cert.sh: #572: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #573: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #574: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #575: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #576: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #577: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #578: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #579: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #580: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser50.cert
cert.sh: #581: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #582: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #583: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #584: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #585: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #586: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #587: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #588: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #589: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser51.cert
cert.sh: #590: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #591: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #592: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #593: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #594: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #595: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #596: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #597: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #598: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser52.cert
cert.sh: #599: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #600: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #601: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #602: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #603: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #604: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #605: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #606: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #607: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #608: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #609: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #610: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #611: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #612: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #613: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #614: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #615: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #616: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #617: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #618: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #619: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 17:31:07 PST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Tue Nov 27 17:31:07 PST 2012
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #620: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #621: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #622: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: The certificate/key database is in an old, unsupported format.
dbtests.sh: #623: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir

database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/key3.db" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #624: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir

dbtests.sh: #625: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir

dbtests.sh: #626: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": security library: bad database.
dbtests.sh: #627: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir

database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/emptydir/key3.db" does not exist.
dbtests.sh: #628: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir

ERROR: Directory "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/secmod.db" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/cert8.db" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #629: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": security library: bad database.
dbtests.sh: #630: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir

database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/secmod.db
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/cert8.db
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/key3.db
dbtests.sh: #631: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir

ERROR: Directory "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/secmod.db" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/cert8.db" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #632: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x  9 tinderbox  staff     306 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir
-r--r-----  1 tinderbox  staff     579 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/TestUser-ec.cert
-r--r-----  1 tinderbox  staff     576 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/TestUser-ecmixed.cert
-r--r-----  1 tinderbox  staff     609 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/TestUser.cert
-r--------  1 tinderbox  staff  131072 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/cert8.db
-r--------  1 tinderbox  staff   49152 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/key3.db
-r--r-----  1 tinderbox  staff     392 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/req
-r--------  1 tinderbox  staff   16384 Nov 27 17:31 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ronlydir/secmod.db

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #633: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:55 2012
            Not After : Tue Nov 28 01:29:55 2017
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:4b:09:21:90:a7:23:82:6d:30:dc:3e:d5:53:fd:19:
                    8c:70:d7:ac:a9:d5:85:5c:9e:a2:80:a2:2e:73:83:1a:
                    95:d4:c5:ae:cc:0c:1f:1c:26:bc:79:bc:74:b4:82:d4:
                    62:28:5f:23:4b:fc:ed:98:c7:f4:3c:0b:e0:44:c0:18:
                    e5:f8:9e:48:fb:dc:57:5c:8f:68:d3:ea:83:02:9f:7f:
                    e6:64:6b:bb:25:83:23:ba:78:1e:74:e0:02:af:9f:75:
                    02:e4:f6:cb:e0:2a:a6:3f:cd:3c:5a:d3:e6:3c:81:58:
                    81:13:fb:48:93:4f:49:e9:3e:31:c3:8b:07:95:71:23
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1b:f1:6b:5a:72:4a:8a:66:03:ff:7b:bb:93:4d:cf:04:
        21:f7:7e:71:cb:ff:ff:1b:46:cb:35:e0:79:17:98:c5:
        21:c7:2e:a7:cf:68:00:9a:c0:74:1d:3a:33:8d:69:84:
        a0:4e:cb:93:e5:2f:93:d0:76:41:ba:ed:49:69:cb:79:
        4c:ee:30:fc:1a:93:03:45:af:17:c1:01:fc:ba:69:16:
        7c:9c:89:05:d8:ea:81:ea:ea:be:40:28:7c:fc:6e:97:
        dc:3e:c0:85:99:96:a3:3f:d5:f3:56:7b:0b:b7:b7:64:
        34:c3:c3:ca:df:79:67:81:90:b0:a6:7f:a1:e6:40:f1
    Fingerprint (MD5):
        78:03:C1:E5:0D:02:4A:5F:21:D8:A2:31:06:BE:A8:F2
    Fingerprint (SHA1):
        60:F0:19:8B:C3:9F:34:F6:29:B9:8C:C4:67:62:20:3E:99:1D:20:CB

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #634: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Tue Nov 27 17:31:09 PST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 17:31:09 PST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #635: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                06:d7:20:f2:16:37:4b:af:03:70:d5:c6:0c:8e:0b:e2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #636: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #637: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #638: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #639: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                66:ca:63:59:a8:cc:80:a2:b6:bb:f6:55:88:72:24:47
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 01:29:41 2012
            Not After : Tue Nov 28 01:29:41 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:01:02:87:87:6f:9b:e8:24:c6:54:84:c0:11:02:81:
                    32:58:17:c4:27:ff:e2:4c:6a:55:30:a0:9f:d5:db:90:
                    f3:f1:1f:60:22:ba:d4:4a:ba:f3:25:2f:07:05:41:0e:
                    f4:56:34:0b:03:8b:a0:28:a0:37:3b:bb:57:55:c7:37:
                    69:78:e6:00:6b:5c:31:07:43:93:a0:00:fe:4f:c1:66:
                    38:67:41:00:46:7b:0e:40:e8:ce:0a:2e:0f:c0:df:46:
                    d1:4e:2d:f1:c6:3d:eb:8c:d1:fa:8c:7b:e2:7f:34:55:
                    db:c2:42:01:02:f4:bc:fc:a5:c8:9d:0e:9f:78:a5:bf:
                    3b:04:dd:52:d6
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:41:10:57:48:96:c6:3b:d2:dc:b5:05:97:
        07:46:14:95:74:1b:ea:6d:47:1e:ed:c1:86:66:70:eb:
        af:f3:ae:e4:89:df:e2:c1:4d:40:f6:25:42:6d:e9:0e:
        7d:19:b2:41:9a:bf:39:3c:24:aa:7e:89:aa:f1:2e:be:
        41:b5:b2:5f:03:ed:02:42:01:5e:21:47:87:14:f7:b9:
        61:cb:f1:37:4a:6e:b8:ca:18:aa:dc:2d:1c:b4:26:c1:
        f1:45:40:6d:e4:55:48:36:cc:9e:f1:9e:f5:91:b5:aa:
        a1:4c:5e:42:cc:74:54:8d:29:8b:11:48:8d:b1:83:cd:
        53:3c:5c:b9:58:ea:b0:8a:ec:49
    Fingerprint (MD5):
        2E:B9:06:AC:5E:54:D7:31:36:AD:31:46:74:4D:D9:D4
    Fingerprint (SHA1):
        AB:12:11:DC:82:7C:CA:FA:26:7F:D8:6E:32:77:C0:24:C2:69:7F:CC

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:62:64:18:e1:3b:a3:e6:72:66:10:4c:7a:34:77:61:
                    34:bd:28:2e:e1:16:f8:9b:be:c4:0c:16:eb:eb:1f:98:
                    8b:c5:fc:e0:c0:fa:94:c1:9d:1c:f1:4c:0b:03:8d:38:
                    2c:e4:80:6c:dd:1a:0b:e9:88:c2:67:e7:03:29:36:37:
                    f8:4a:6c:0c:b5:1c:98:dc:45:40:f3:ac:8c:79:f5:b8:
                    fa:e4:02:91:7f:b1:7e:d5:dd:87:17:96:f4:f7:cb:8f:
                    3d
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:00:ca:e7:7c:6f:9b:e9:83:90:80:12:
        c0:0c:11:3b:54:a4:fe:d9:86:97:09:ff:a8:70:2f:29:
        00:8a:f4:b9:06:fb:34:ca:a7:7b:bf:e6:01:c7:ea:69:
        dd:39:ce:c3:4b:ca:d2:a5:76:7d:39:d4:8d:8c:74:79:
        49:64:27:6a:0c:a0:67:02:41:71:5e:b0:c7:50:9f:72:
        7f:bc:07:7c:23:7f:c8:a1:e6:5a:c0:ff:95:bf:08:e0:
        d1:59:bd:7c:4f:a9:c0:01:2f:c4:09:fa:ae:8f:93:8f:
        c3:42:b3:a5:37:d1:ff:77:27:5b:c5:38:6a:ea:1e:dc:
        c7:91:0c:35:ac:a1:d1:62:39:55
    Fingerprint (MD5):
        C9:88:BA:7A:A1:D3:1A:24:B9:46:86:00:2D:AA:32:89
    Fingerprint (SHA1):
        74:DE:46:B1:6D:24:01:F5:1C:BE:4E:F8:F4:C7:3B:D8:14:FF:D3:6C

    Friendly Name: Alice-ec

tools.sh: #640: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #641: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                a6:07:e7:17:fb:bf:2a:a0:3a:a6:87:e6:58:9a:21:77
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #642: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #643: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #644: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                fd:97:0d:2e:d5:e5:95:40:0f:72:6c:42:55:db:cd:c2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #645: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #646: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #647: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                01:f3:c6:47:77:71:11:29:5b:74:20:05:09:2f:d9:75
            Iteration Count: 2000 (0x7d0)
tools.sh: #648: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #649: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #650: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0e:20:2c:bb:0c:5a:82:db:53:4f:11:ca:7b:c2:68:bd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #651: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #652: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c5:bc:39:eb:aa:d7:f4:ad:fa:43:53:ca:6c:87:c2:6e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e7:8b:7b:77:96:87:60:b9:04:70:a4:67:07:fe:60:8b
            Iteration Count: 2000 (0x7d0)
tools.sh: #657: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #658: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        8a:a3:28:b7:b0:79:93:25:88:0c:7b:07:04:b9:2b:99
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:d3:ff:a8:b7:06:f4:ad:b1:ea:a4:8b:29:ee:1e:
                    2b:da
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a1:b7:a8:58:67:c4:e6:9f:7c:d4:94:a2:88:62:92:b2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:da:29:21:bd:ca:a3:76:2d:9e:87:0c:4f:94:79:
                    bc:59
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        88:01:01:01:f5:1c:76:dc:31:17:f4:68:d0:f2:b0:7e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:5e:5a:4e:6d:3c:03:38:94:b2:4d:79:d1:e9:28:
                    ce:b4
tools.sh: #666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f5:d1:38:05:d6:a2:9f:ee:06:48:b1:04:05:c5:ce:d2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:98:5c:fb:bf:2f:b5:e5:ed:02:c7:8c:a3:f1:00:
                    28:45
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3c:12:61:91:e8:00:f3:91:cd:29:0e:23:61:b0:2a:03
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:22:57:77:d6:09:6a:90:de:36:a0:fb:9e:75:e4:
                    84:4e
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a9:0d:c4:e1:d4:6b:cb:9c:77:69:db:b2:1a:f0:bc:64
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:a7:07:91:3b:db:84:d7:06:19:bb:f5:09:5c:59:
                    c9:86
tools.sh: #675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        67:2d:93:30:91:c0:92:1f:42:06:2e:1c:bc:61:0a:88
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:65:5f:6f:89:1f:25:96:63:3a:b0:99:f5:d5:fd:
                    40:03
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        be:b9:3a:85:f9:ee:a7:5b:48:d1:c1:3d:0e:96:0a:14
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:20:1f:d3:e5:74:e3:81:98:1d:57:b0:7a:12:42:
                    11:fc
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        02:aa:c9:0a:87:b0:48:b0:76:c4:03:b7:71:37:5f:89
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:64:38:98:eb:4b:dc:05:6d:e8:0e:10:e3:71:1a:
                    26:36
tools.sh: #684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        53:f3:45:ae:a9:c9:42:dc:69:bd:2f:2a:d8:dc:df:9f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:d7:04:9d:6b:8f:92:4d:3c:aa:11:0c:5c:8e:b6:
                    2e:09
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        fe:b3:22:2a:46:9a:f8:46:f0:18:7e:43:16:d4:73:d4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:e2:be:80:da:e0:9f:7a:31:5a:f3:84:92:a2:01:
                    c3:30
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5a:49:a5:c8:b5:08:7f:8a:61:7a:df:27:fc:d6:0a:53
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:6f:b8:97:76:a7:21:8d:9e:a8:7d:3f:7f:64:61:
                    72:80
tools.sh: #693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ba:bc:72:20:41:38:ac:44:f7:69:58:f2:d4:68:38:f5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:16:1b:ec:fd:08:c2:eb:c0:96:5b:d2:6e:06:76:
                    f6:05
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a1:82:29:94:3d:07:b2:35:8f:51:5f:e7:3e:07:12:93
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:82:ab:fd:e5:20:c8:7e:10:83:bc:21:c3:62:b3:
                    74:8a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        24:a3:c0:2a:27:d4:5b:49:06:5e:a0:72:3e:25:d4:01
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:b7:1c:de:46:95:1c:53:5d:9a:38:a8:f5:6d:ba:
                    85:a1
tools.sh: #702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        65:ba:b6:c1:1d:e4:41:26:02:52:d0:a6:d7:ca:02:12
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:ff:43:2e:22:ad:47:18:a4:ae:a2:7b:07:99:b9:
                    0e:3c
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e6:af:d6:de:62:3c:e4:4c:c6:aa:82:66:5c:12:0f:fb
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:4f:1c:93:6c:24:83:2b:c4:46:d7:20:72:1d:69:
                    4c:72
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2e:a7:f3:69:17:48:25:f5:dd:e4:40:89:ba:01:98:2b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:85:3c:f1:4c:e6:8b:a5:b3:a4:28:43:7f:42:70:
                    9f:af
tools.sh: #711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                f3:2f:d9:d8:9d:6d:b2:10:8c:3b:a3:21:2a:f3:57:e0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                4c:af:4f:aa:75:16:13:8a:ec:c6:19:04:4c:72:32:6f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                d1:d4:cf:92:58:f0:2e:b7:ce:02:ec:cd:b3:3a:11:3b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                a6:72:e8:ad:e7:a4:f6:5f:dd:05:a0:86:c1:24:2c:35
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                e0:0c:f7:fd:5a:29:49:d5:ff:bb:59:11:c2:31:0c:52
            Iteration Count: 2000 (0x7d0)
tools.sh: #726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                94:d8:18:1c:07:d8:7e:26:3b:76:9a:60:6e:b9:bc:72
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                4b:04:1e:dc:e6:11:3b:7e:6f:ea:9e:89:ed:8f:5b:da
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                82:a1:a2:dd:42:6c:08:5b:51:f0:8b:0a:10:10:65:7c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ec:ef:21:5b:d9:9d:bb:5c:23:9f:3a:d5:3c:b9:52:88
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                f9:70:6d:1a:82:fd:6d:48:8d:8a:67:de:82:be:31:ef
            Iteration Count: 2000 (0x7d0)
tools.sh: #741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                d2:75:aa:49:80:90:f2:3f:54:d2:97:8f:89:0e:59:31
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                92:e3:56:ea:5e:28:cd:05:12:bb:12:16:ac:ac:ce:ae
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ee:be:56:56:3e:c3:8c:e1:41:27:64:ca:b9:0f:ea:95
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                e2:e8:ce:45:de:7f:1c:7e:8f:87:4e:74:c3:61:1a:14
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ee:cb:2d:02:fd:29:2b:a9:05:2a:b1:b2:5e:a8:ab:1c
            Iteration Count: 2000 (0x7d0)
tools.sh: #756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                92:13:fc:91:64:3f:a4:c8:4f:24:57:43:00:dc:87:74
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                75:97:5c:f2:04:33:0f:a8:07:53:33:01:cb:6f:6d:e1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                5b:ef:9c:12:b6:1c:3a:5a:26:87:ec:7a:6f:77:a7:7b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                71:11:10:67:83:49:da:51:c0:9e:c2:02:f4:19:28:2c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                be:e1:f7:78:6a:c6:a8:b3:46:48:c4:8c:b1:28:4c:84
            Iteration Count: 2000 (0x7d0)
tools.sh: #771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                19:de:f7:23:78:7a:29:81:99:0f:5c:6b:d7:8d:d5:a7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e4:c2:2e:23:fd:34:5a:b7:9d:92:2c:a9:1a:89:c9:47
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0a:d9:1b:00:d1:fb:0f:0a:37:9a:55:31:fb:11:ef:c9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9a:54:b0:fa:0d:3d:7e:be:0c:44:16:5d:38:34:63:4b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                87:f6:1a:43:81:b4:4d:86:da:10:8a:17:ab:d8:c2:85
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #786: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ce:3b:53:ba:38:c3:f4:d1:c3:d8:d2:6c:69:c7:ac:27
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #789: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9c:7c:b6:6b:4a:47:1d:c1:3b:15:30:7c:a2:b2:84:8c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #792: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                eb:f6:07:91:6c:e7:d3:1f:1f:49:6b:b4:c6:25:eb:b1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #795: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                74:43:fe:e0:c2:36:e8:ee:fa:3a:c8:89:ba:a4:1d:7c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #798: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0c:a2:54:8d:da:7b:ef:3c:63:82:43:ed:0a:4d:54:91
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #801: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #803: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #804: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #805: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #806: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #807: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #808: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #809: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #810: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #811: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 17:31:27 PST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 17:31:27 PST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #812: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #813: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      a2070ac4f1d6ed14f3388a65f5fdebd64989187e   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #814: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #815: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #816: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #817: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #818: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #819: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #820: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #821: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #822: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #823: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #824: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      a2070ac4f1d6ed14f3388a65f5fdebd64989187e   FIPS_PUB_140_Test_Certificate
fips.sh: #825: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #826: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #827: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #828: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #829: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      a2070ac4f1d6ed14f3388a65f5fdebd64989187e   FIPS_PUB_140_Test_Certificate
fips.sh: #830: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #831: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #832: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcrmf.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libjar.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckfw.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle/libsoftokn3.dylib
mangle -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle/libsoftokn3.dylib -o -8 -b 5
Changing byte 0x00048078 (295032): from 65 (101) to 45 (69)
DYLD_LIBRARY_PATH=/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/fips/mangle dbtest -r -d ../fips
fips.sh: #833: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 17:31:43 PST 2012
Running tests for sdr
TIMESTAMP sdr BEGIN: Tue Nov 27 17:31:43 PST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v1.64867 -t "Test1"
sdr.sh: #834: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v2.64867 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #835: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v3.64867 -t "1234567"
sdr.sh: #836: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v1.64867 -t "Test1"
sdr.sh: #837: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v2.64867 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #838: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v3.64867 -t "1234567"
sdr.sh: #839: Decrypt - Value 3  - PASSED
TIMESTAMP sdr END: Tue Nov 27 17:31:43 PST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 17:31:43 PST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #840: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #841: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 17:31:43 PST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 17:31:43 PST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #842: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #843: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #844: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #845: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #846: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #847: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #848: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #849: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #850: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #851: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #852: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #853: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #854: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #855: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #856: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #857: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #858: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #859: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #860: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #861: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #862: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #863: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #864: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #865: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #866: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #867: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #868: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #869: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #870: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #871: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #872: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #873: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #874: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #875: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #876: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #877: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #878: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #879: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #880: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #881: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #882: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #883: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #884: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #885: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #886: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #887: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #888: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #889: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #890: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #891: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #892: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #893: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #894: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #895: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #896: Decode Encrypted-Data . - PASSED
smime.sh: #897: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #898: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #899: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #900: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #901: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #902: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 17:31:49 PST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 17:31:49 PST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 82918 >/dev/null 2>/dev/null
selfserv with PID 82918 found at Tue Nov 27 17:31:49 PST 2012
selfserv with PID 82918 started at Tue Nov 27 17:31:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #903: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 82918 at Tue Nov 27 17:31:49 PST 2012
kill -USR1 82918
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 82918 killed at Tue Nov 27 17:31:49 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 82965 >/dev/null 2>/dev/null
selfserv with PID 82965 found at Tue Nov 27 17:31:49 PST 2012
selfserv with PID 82965 started at Tue Nov 27 17:31:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #904: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 82965 at Tue Nov 27 17:31:50 PST 2012
kill -USR1 82965
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 82965 killed at Tue Nov 27 17:31:50 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83012 >/dev/null 2>/dev/null
selfserv with PID 83012 found at Tue Nov 27 17:31:50 PST 2012
selfserv with PID 83012 started at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #905: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83012 at Tue Nov 27 17:31:50 PST 2012
kill -USR1 83012
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83012 killed at Tue Nov 27 17:31:50 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83071 >/dev/null 2>/dev/null
selfserv with PID 83071 found at Tue Nov 27 17:31:50 PST 2012
selfserv with PID 83071 started at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #906: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83071 at Tue Nov 27 17:31:50 PST 2012
kill -USR1 83071
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83071 killed at Tue Nov 27 17:31:50 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83118 >/dev/null 2>/dev/null
selfserv with PID 83118 found at Tue Nov 27 17:31:50 PST 2012
selfserv with PID 83118 started at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #907: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83118 at Tue Nov 27 17:31:50 PST 2012
kill -USR1 83118
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83118 killed at Tue Nov 27 17:31:50 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83165 >/dev/null 2>/dev/null
selfserv with PID 83165 found at Tue Nov 27 17:31:50 PST 2012
selfserv with PID 83165 started at Tue Nov 27 17:31:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #908: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83165 at Tue Nov 27 17:31:51 PST 2012
kill -USR1 83165
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83165 killed at Tue Nov 27 17:31:51 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83224 >/dev/null 2>/dev/null
selfserv with PID 83224 found at Tue Nov 27 17:31:51 PST 2012
selfserv with PID 83224 started at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #909: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83224 at Tue Nov 27 17:31:51 PST 2012
kill -USR1 83224
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83224 killed at Tue Nov 27 17:31:51 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83271 >/dev/null 2>/dev/null
selfserv with PID 83271 found at Tue Nov 27 17:31:51 PST 2012
selfserv with PID 83271 started at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #910: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83271 at Tue Nov 27 17:31:51 PST 2012
kill -USR1 83271
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83271 killed at Tue Nov 27 17:31:51 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83318 >/dev/null 2>/dev/null
selfserv with PID 83318 found at Tue Nov 27 17:31:51 PST 2012
selfserv with PID 83318 started at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #911: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83318 at Tue Nov 27 17:31:51 PST 2012
kill -USR1 83318
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83318 killed at Tue Nov 27 17:31:51 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83377 >/dev/null 2>/dev/null
selfserv with PID 83377 found at Tue Nov 27 17:31:51 PST 2012
selfserv with PID 83377 started at Tue Nov 27 17:31:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #912: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83377 at Tue Nov 27 17:31:52 PST 2012
kill -USR1 83377
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83377 killed at Tue Nov 27 17:31:52 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83424 >/dev/null 2>/dev/null
selfserv with PID 83424 found at Tue Nov 27 17:31:52 PST 2012
selfserv with PID 83424 started at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #913: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83424 at Tue Nov 27 17:31:52 PST 2012
kill -USR1 83424
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83424 killed at Tue Nov 27 17:31:52 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83471 >/dev/null 2>/dev/null
selfserv with PID 83471 found at Tue Nov 27 17:31:52 PST 2012
selfserv with PID 83471 started at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #914: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83471 at Tue Nov 27 17:31:52 PST 2012
kill -USR1 83471
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83471 killed at Tue Nov 27 17:31:52 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83530 >/dev/null 2>/dev/null
selfserv with PID 83530 found at Tue Nov 27 17:31:52 PST 2012
selfserv with PID 83530 started at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #915: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83530 at Tue Nov 27 17:31:52 PST 2012
kill -USR1 83530
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83530 killed at Tue Nov 27 17:31:52 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83577 >/dev/null 2>/dev/null
selfserv with PID 83577 found at Tue Nov 27 17:31:52 PST 2012
selfserv with PID 83577 started at Tue Nov 27 17:31:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #916: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83577 at Tue Nov 27 17:31:53 PST 2012
kill -USR1 83577
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83577 killed at Tue Nov 27 17:31:53 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83624 >/dev/null 2>/dev/null
selfserv with PID 83624 found at Tue Nov 27 17:31:53 PST 2012
selfserv with PID 83624 started at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #917: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83624 at Tue Nov 27 17:31:53 PST 2012
kill -USR1 83624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83624 killed at Tue Nov 27 17:31:53 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83683 >/dev/null 2>/dev/null
selfserv with PID 83683 found at Tue Nov 27 17:31:53 PST 2012
selfserv with PID 83683 started at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #918: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83683 at Tue Nov 27 17:31:53 PST 2012
kill -USR1 83683
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83683 killed at Tue Nov 27 17:31:53 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83730 >/dev/null 2>/dev/null
selfserv with PID 83730 found at Tue Nov 27 17:31:53 PST 2012
selfserv with PID 83730 started at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #919: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83730 at Tue Nov 27 17:31:53 PST 2012
kill -USR1 83730
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83730 killed at Tue Nov 27 17:31:53 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83777 >/dev/null 2>/dev/null
selfserv with PID 83777 found at Tue Nov 27 17:31:53 PST 2012
selfserv with PID 83777 started at Tue Nov 27 17:31:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #920: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 83777 at Tue Nov 27 17:31:54 PST 2012
kill -USR1 83777
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83777 killed at Tue Nov 27 17:31:54 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83836 >/dev/null 2>/dev/null
selfserv with PID 83836 found at Tue Nov 27 17:31:54 PST 2012
selfserv with PID 83836 started at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #921: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83836 at Tue Nov 27 17:31:54 PST 2012
kill -USR1 83836
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83836 killed at Tue Nov 27 17:31:54 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83883 >/dev/null 2>/dev/null
selfserv with PID 83883 found at Tue Nov 27 17:31:54 PST 2012
selfserv with PID 83883 started at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83883 at Tue Nov 27 17:31:54 PST 2012
kill -USR1 83883
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83883 killed at Tue Nov 27 17:31:54 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83930 >/dev/null 2>/dev/null
selfserv with PID 83930 found at Tue Nov 27 17:31:54 PST 2012
selfserv with PID 83930 started at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #923: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83930 at Tue Nov 27 17:31:54 PST 2012
kill -USR1 83930
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83930 killed at Tue Nov 27 17:31:54 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83989 >/dev/null 2>/dev/null
selfserv with PID 83989 found at Tue Nov 27 17:31:54 PST 2012
selfserv with PID 83989 started at Tue Nov 27 17:31:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #924: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 83989 at Tue Nov 27 17:31:54 PST 2012
kill -USR1 83989
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83989 killed at Tue Nov 27 17:31:54 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84036 >/dev/null 2>/dev/null
selfserv with PID 84036 found at Tue Nov 27 17:31:55 PST 2012
selfserv with PID 84036 started at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #925: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84036 at Tue Nov 27 17:31:55 PST 2012
kill -USR1 84036
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84036 killed at Tue Nov 27 17:31:55 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84083 >/dev/null 2>/dev/null
selfserv with PID 84083 found at Tue Nov 27 17:31:55 PST 2012
selfserv with PID 84083 started at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #926: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84083 at Tue Nov 27 17:31:55 PST 2012
kill -USR1 84083
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84083 killed at Tue Nov 27 17:31:55 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84142 >/dev/null 2>/dev/null
selfserv with PID 84142 found at Tue Nov 27 17:31:55 PST 2012
selfserv with PID 84142 started at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #927: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84142 at Tue Nov 27 17:31:55 PST 2012
kill -USR1 84142
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84142 killed at Tue Nov 27 17:31:55 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84189 >/dev/null 2>/dev/null
selfserv with PID 84189 found at Tue Nov 27 17:31:55 PST 2012
selfserv with PID 84189 started at Tue Nov 27 17:31:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #928: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84189 at Tue Nov 27 17:31:55 PST 2012
kill -USR1 84189
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84189 killed at Tue Nov 27 17:31:55 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84236 >/dev/null 2>/dev/null
selfserv with PID 84236 found at Tue Nov 27 17:31:56 PST 2012
selfserv with PID 84236 started at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #929: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84236 at Tue Nov 27 17:31:56 PST 2012
kill -USR1 84236
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84236 killed at Tue Nov 27 17:31:56 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84295 >/dev/null 2>/dev/null
selfserv with PID 84295 found at Tue Nov 27 17:31:56 PST 2012
selfserv with PID 84295 started at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #930: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84295 at Tue Nov 27 17:31:56 PST 2012
kill -USR1 84295
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84295 killed at Tue Nov 27 17:31:56 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84342 >/dev/null 2>/dev/null
selfserv with PID 84342 found at Tue Nov 27 17:31:56 PST 2012
selfserv with PID 84342 started at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #931: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84342 at Tue Nov 27 17:31:56 PST 2012
kill -USR1 84342
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84342 killed at Tue Nov 27 17:31:56 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84389 >/dev/null 2>/dev/null
selfserv with PID 84389 found at Tue Nov 27 17:31:56 PST 2012
selfserv with PID 84389 started at Tue Nov 27 17:31:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #932: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84389 at Tue Nov 27 17:31:56 PST 2012
kill -USR1 84389
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84389 killed at Tue Nov 27 17:31:56 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84448 >/dev/null 2>/dev/null
selfserv with PID 84448 found at Tue Nov 27 17:31:57 PST 2012
selfserv with PID 84448 started at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #933: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84448 at Tue Nov 27 17:31:57 PST 2012
kill -USR1 84448
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84448 killed at Tue Nov 27 17:31:57 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84495 >/dev/null 2>/dev/null
selfserv with PID 84495 found at Tue Nov 27 17:31:57 PST 2012
selfserv with PID 84495 started at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #934: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84495 at Tue Nov 27 17:31:57 PST 2012
kill -USR1 84495
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84495 killed at Tue Nov 27 17:31:57 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:31:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84542 >/dev/null 2>/dev/null
selfserv with PID 84542 found at Tue Nov 27 17:31:57 PST 2012
selfserv with PID 84542 started at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #935: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84542 at Tue Nov 27 17:31:57 PST 2012
kill -USR1 84542
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84542 killed at Tue Nov 27 17:31:57 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84601 >/dev/null 2>/dev/null
selfserv with PID 84601 found at Tue Nov 27 17:31:57 PST 2012
selfserv with PID 84601 started at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #936: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84601 at Tue Nov 27 17:31:57 PST 2012
kill -USR1 84601
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84601 killed at Tue Nov 27 17:31:57 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84648 >/dev/null 2>/dev/null
selfserv with PID 84648 found at Tue Nov 27 17:31:57 PST 2012
selfserv with PID 84648 started at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84648 at Tue Nov 27 17:31:58 PST 2012
kill -USR1 84648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84648 killed at Tue Nov 27 17:31:58 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:31:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84695 >/dev/null 2>/dev/null
selfserv with PID 84695 found at Tue Nov 27 17:31:58 PST 2012
selfserv with PID 84695 started at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #938: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 84695 at Tue Nov 27 17:31:58 PST 2012
kill -USR1 84695
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84695 killed at Tue Nov 27 17:31:58 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84754 >/dev/null 2>/dev/null
selfserv with PID 84754 found at Tue Nov 27 17:31:58 PST 2012
selfserv with PID 84754 started at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #939: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84754 at Tue Nov 27 17:31:58 PST 2012
kill -USR1 84754
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84754 killed at Tue Nov 27 17:31:58 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84801 >/dev/null 2>/dev/null
selfserv with PID 84801 found at Tue Nov 27 17:31:58 PST 2012
selfserv with PID 84801 started at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84801 at Tue Nov 27 17:31:58 PST 2012
kill -USR1 84801
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84801 killed at Tue Nov 27 17:31:58 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:31:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84848 >/dev/null 2>/dev/null
selfserv with PID 84848 found at Tue Nov 27 17:31:58 PST 2012
selfserv with PID 84848 started at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #941: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84848 at Tue Nov 27 17:31:59 PST 2012
kill -USR1 84848
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84848 killed at Tue Nov 27 17:31:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:31:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84907 >/dev/null 2>/dev/null
selfserv with PID 84907 found at Tue Nov 27 17:31:59 PST 2012
selfserv with PID 84907 started at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #942: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84907 at Tue Nov 27 17:31:59 PST 2012
kill -USR1 84907
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84907 killed at Tue Nov 27 17:31:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:31:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84954 >/dev/null 2>/dev/null
selfserv with PID 84954 found at Tue Nov 27 17:31:59 PST 2012
selfserv with PID 84954 started at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #943: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 84954 at Tue Nov 27 17:31:59 PST 2012
kill -USR1 84954
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84954 killed at Tue Nov 27 17:31:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:31:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85001 >/dev/null 2>/dev/null
selfserv with PID 85001 found at Tue Nov 27 17:31:59 PST 2012
selfserv with PID 85001 started at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #944: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85001 at Tue Nov 27 17:31:59 PST 2012
kill -USR1 85001
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85001 killed at Tue Nov 27 17:31:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:31:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85060 >/dev/null 2>/dev/null
selfserv with PID 85060 found at Tue Nov 27 17:31:59 PST 2012
selfserv with PID 85060 started at Tue Nov 27 17:31:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #945: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85060 at Tue Nov 27 17:32:00 PST 2012
kill -USR1 85060
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85060 killed at Tue Nov 27 17:32:00 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85107 >/dev/null 2>/dev/null
selfserv with PID 85107 found at Tue Nov 27 17:32:00 PST 2012
selfserv with PID 85107 started at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #946: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85107 at Tue Nov 27 17:32:00 PST 2012
kill -USR1 85107
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85107 killed at Tue Nov 27 17:32:00 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85154 >/dev/null 2>/dev/null
selfserv with PID 85154 found at Tue Nov 27 17:32:00 PST 2012
selfserv with PID 85154 started at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #947: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85154 at Tue Nov 27 17:32:00 PST 2012
kill -USR1 85154
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85154 killed at Tue Nov 27 17:32:00 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85213 >/dev/null 2>/dev/null
selfserv with PID 85213 found at Tue Nov 27 17:32:00 PST 2012
selfserv with PID 85213 started at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #948: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85213 at Tue Nov 27 17:32:00 PST 2012
kill -USR1 85213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85213 killed at Tue Nov 27 17:32:00 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85260 >/dev/null 2>/dev/null
selfserv with PID 85260 found at Tue Nov 27 17:32:00 PST 2012
selfserv with PID 85260 started at Tue Nov 27 17:32:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #949: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85260 at Tue Nov 27 17:32:01 PST 2012
kill -USR1 85260
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85260 killed at Tue Nov 27 17:32:01 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85307 >/dev/null 2>/dev/null
selfserv with PID 85307 found at Tue Nov 27 17:32:01 PST 2012
selfserv with PID 85307 started at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #950: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85307 at Tue Nov 27 17:32:01 PST 2012
kill -USR1 85307
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85307 killed at Tue Nov 27 17:32:01 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85366 >/dev/null 2>/dev/null
selfserv with PID 85366 found at Tue Nov 27 17:32:01 PST 2012
selfserv with PID 85366 started at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #951: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85366 at Tue Nov 27 17:32:01 PST 2012
kill -USR1 85366
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85366 killed at Tue Nov 27 17:32:01 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85413 >/dev/null 2>/dev/null
selfserv with PID 85413 found at Tue Nov 27 17:32:01 PST 2012
selfserv with PID 85413 started at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #952: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85413 at Tue Nov 27 17:32:01 PST 2012
kill -USR1 85413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85413 killed at Tue Nov 27 17:32:01 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85460 >/dev/null 2>/dev/null
selfserv with PID 85460 found at Tue Nov 27 17:32:01 PST 2012
selfserv with PID 85460 started at Tue Nov 27 17:32:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #953: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85460 at Tue Nov 27 17:32:02 PST 2012
kill -USR1 85460
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85460 killed at Tue Nov 27 17:32:02 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85519 >/dev/null 2>/dev/null
selfserv with PID 85519 found at Tue Nov 27 17:32:02 PST 2012
selfserv with PID 85519 started at Tue Nov 27 17:32:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #954: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85519 at Tue Nov 27 17:32:02 PST 2012
kill -USR1 85519
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85519 killed at Tue Nov 27 17:32:02 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85566 >/dev/null 2>/dev/null
selfserv with PID 85566 found at Tue Nov 27 17:32:02 PST 2012
selfserv with PID 85566 started at Tue Nov 27 17:32:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85566 at Tue Nov 27 17:32:02 PST 2012
kill -USR1 85566
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85566 killed at Tue Nov 27 17:32:02 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85613 >/dev/null 2>/dev/null
selfserv with PID 85613 found at Tue Nov 27 17:32:02 PST 2012
selfserv with PID 85613 started at Tue Nov 27 17:32:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #956: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85613 at Tue Nov 27 17:32:03 PST 2012
kill -USR1 85613
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85613 killed at Tue Nov 27 17:32:03 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85672 >/dev/null 2>/dev/null
selfserv with PID 85672 found at Tue Nov 27 17:32:03 PST 2012
selfserv with PID 85672 started at Tue Nov 27 17:32:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85672 at Tue Nov 27 17:32:03 PST 2012
kill -USR1 85672
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85672 killed at Tue Nov 27 17:32:03 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85719 >/dev/null 2>/dev/null
selfserv with PID 85719 found at Tue Nov 27 17:32:03 PST 2012
selfserv with PID 85719 started at Tue Nov 27 17:32:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85719 at Tue Nov 27 17:32:03 PST 2012
kill -USR1 85719
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85719 killed at Tue Nov 27 17:32:03 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85766 >/dev/null 2>/dev/null
selfserv with PID 85766 found at Tue Nov 27 17:32:03 PST 2012
selfserv with PID 85766 started at Tue Nov 27 17:32:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #959: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85766 at Tue Nov 27 17:32:04 PST 2012
kill -USR1 85766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85766 killed at Tue Nov 27 17:32:04 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85825 >/dev/null 2>/dev/null
selfserv with PID 85825 found at Tue Nov 27 17:32:04 PST 2012
selfserv with PID 85825 started at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #960: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85825 at Tue Nov 27 17:32:04 PST 2012
kill -USR1 85825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85825 killed at Tue Nov 27 17:32:04 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85872 >/dev/null 2>/dev/null
selfserv with PID 85872 found at Tue Nov 27 17:32:04 PST 2012
selfserv with PID 85872 started at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #961: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85872 at Tue Nov 27 17:32:04 PST 2012
kill -USR1 85872
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85872 killed at Tue Nov 27 17:32:04 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85919 >/dev/null 2>/dev/null
selfserv with PID 85919 found at Tue Nov 27 17:32:04 PST 2012
selfserv with PID 85919 started at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 85919 at Tue Nov 27 17:32:04 PST 2012
kill -USR1 85919
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85919 killed at Tue Nov 27 17:32:04 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85978 >/dev/null 2>/dev/null
selfserv with PID 85978 found at Tue Nov 27 17:32:04 PST 2012
selfserv with PID 85978 started at Tue Nov 27 17:32:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 85978 at Tue Nov 27 17:32:05 PST 2012
kill -USR1 85978
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85978 killed at Tue Nov 27 17:32:05 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86025 >/dev/null 2>/dev/null
selfserv with PID 86025 found at Tue Nov 27 17:32:05 PST 2012
selfserv with PID 86025 started at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86025 at Tue Nov 27 17:32:05 PST 2012
kill -USR1 86025
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86025 killed at Tue Nov 27 17:32:05 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86072 >/dev/null 2>/dev/null
selfserv with PID 86072 found at Tue Nov 27 17:32:05 PST 2012
selfserv with PID 86072 started at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86072 at Tue Nov 27 17:32:05 PST 2012
kill -USR1 86072
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86072 killed at Tue Nov 27 17:32:05 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86131 >/dev/null 2>/dev/null
selfserv with PID 86131 found at Tue Nov 27 17:32:05 PST 2012
selfserv with PID 86131 started at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86131 at Tue Nov 27 17:32:05 PST 2012
kill -USR1 86131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86131 killed at Tue Nov 27 17:32:05 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86178 >/dev/null 2>/dev/null
selfserv with PID 86178 found at Tue Nov 27 17:32:05 PST 2012
selfserv with PID 86178 started at Tue Nov 27 17:32:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86178 at Tue Nov 27 17:32:06 PST 2012
kill -USR1 86178
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86178 killed at Tue Nov 27 17:32:06 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86225 >/dev/null 2>/dev/null
selfserv with PID 86225 found at Tue Nov 27 17:32:06 PST 2012
selfserv with PID 86225 started at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86225 at Tue Nov 27 17:32:06 PST 2012
kill -USR1 86225
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86225 killed at Tue Nov 27 17:32:06 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86284 >/dev/null 2>/dev/null
selfserv with PID 86284 found at Tue Nov 27 17:32:06 PST 2012
selfserv with PID 86284 started at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #969: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86284 at Tue Nov 27 17:32:06 PST 2012
kill -USR1 86284
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86284 killed at Tue Nov 27 17:32:06 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86331 >/dev/null 2>/dev/null
selfserv with PID 86331 found at Tue Nov 27 17:32:06 PST 2012
selfserv with PID 86331 started at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #970: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86331 at Tue Nov 27 17:32:06 PST 2012
kill -USR1 86331
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86331 killed at Tue Nov 27 17:32:06 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86378 >/dev/null 2>/dev/null
selfserv with PID 86378 found at Tue Nov 27 17:32:06 PST 2012
selfserv with PID 86378 started at Tue Nov 27 17:32:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #971: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86378 at Tue Nov 27 17:32:07 PST 2012
kill -USR1 86378
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86378 killed at Tue Nov 27 17:32:07 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86437 >/dev/null 2>/dev/null
selfserv with PID 86437 found at Tue Nov 27 17:32:07 PST 2012
selfserv with PID 86437 started at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #972: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86437 at Tue Nov 27 17:32:07 PST 2012
kill -USR1 86437
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86437 killed at Tue Nov 27 17:32:07 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86484 >/dev/null 2>/dev/null
selfserv with PID 86484 found at Tue Nov 27 17:32:07 PST 2012
selfserv with PID 86484 started at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86484 at Tue Nov 27 17:32:07 PST 2012
kill -USR1 86484
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86484 killed at Tue Nov 27 17:32:07 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86531 >/dev/null 2>/dev/null
selfserv with PID 86531 found at Tue Nov 27 17:32:07 PST 2012
selfserv with PID 86531 started at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #974: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86531 at Tue Nov 27 17:32:07 PST 2012
kill -USR1 86531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86531 killed at Tue Nov 27 17:32:07 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86590 >/dev/null 2>/dev/null
selfserv with PID 86590 found at Tue Nov 27 17:32:07 PST 2012
selfserv with PID 86590 started at Tue Nov 27 17:32:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86590 at Tue Nov 27 17:32:08 PST 2012
kill -USR1 86590
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86590 killed at Tue Nov 27 17:32:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86637 >/dev/null 2>/dev/null
selfserv with PID 86637 found at Tue Nov 27 17:32:08 PST 2012
selfserv with PID 86637 started at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86637 at Tue Nov 27 17:32:08 PST 2012
kill -USR1 86637
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86637 killed at Tue Nov 27 17:32:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86684 >/dev/null 2>/dev/null
selfserv with PID 86684 found at Tue Nov 27 17:32:08 PST 2012
selfserv with PID 86684 started at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86684 at Tue Nov 27 17:32:08 PST 2012
kill -USR1 86684
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86684 killed at Tue Nov 27 17:32:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86743 >/dev/null 2>/dev/null
selfserv with PID 86743 found at Tue Nov 27 17:32:08 PST 2012
selfserv with PID 86743 started at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #978: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86743 at Tue Nov 27 17:32:08 PST 2012
kill -USR1 86743
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86743 killed at Tue Nov 27 17:32:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86790 >/dev/null 2>/dev/null
selfserv with PID 86790 found at Tue Nov 27 17:32:08 PST 2012
selfserv with PID 86790 started at Tue Nov 27 17:32:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86790 at Tue Nov 27 17:32:09 PST 2012
kill -USR1 86790
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86790 killed at Tue Nov 27 17:32:09 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86837 >/dev/null 2>/dev/null
selfserv with PID 86837 found at Tue Nov 27 17:32:09 PST 2012
selfserv with PID 86837 started at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86837 at Tue Nov 27 17:32:09 PST 2012
kill -USR1 86837
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86837 killed at Tue Nov 27 17:32:09 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86896 >/dev/null 2>/dev/null
selfserv with PID 86896 found at Tue Nov 27 17:32:09 PST 2012
selfserv with PID 86896 started at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #981: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86896 at Tue Nov 27 17:32:09 PST 2012
kill -USR1 86896
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86896 killed at Tue Nov 27 17:32:09 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86943 >/dev/null 2>/dev/null
selfserv with PID 86943 found at Tue Nov 27 17:32:09 PST 2012
selfserv with PID 86943 started at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 86943 at Tue Nov 27 17:32:09 PST 2012
kill -USR1 86943
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86943 killed at Tue Nov 27 17:32:09 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86990 >/dev/null 2>/dev/null
selfserv with PID 86990 found at Tue Nov 27 17:32:09 PST 2012
selfserv with PID 86990 started at Tue Nov 27 17:32:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 86990 at Tue Nov 27 17:32:10 PST 2012
kill -USR1 86990
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86990 killed at Tue Nov 27 17:32:10 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87049 >/dev/null 2>/dev/null
selfserv with PID 87049 found at Tue Nov 27 17:32:10 PST 2012
selfserv with PID 87049 started at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #984: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87049 at Tue Nov 27 17:32:10 PST 2012
kill -USR1 87049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87049 killed at Tue Nov 27 17:32:10 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87096 >/dev/null 2>/dev/null
selfserv with PID 87096 found at Tue Nov 27 17:32:10 PST 2012
selfserv with PID 87096 started at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #985: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87096 at Tue Nov 27 17:32:10 PST 2012
kill -USR1 87096
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87096 killed at Tue Nov 27 17:32:10 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:32:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87143 >/dev/null 2>/dev/null
selfserv with PID 87143 found at Tue Nov 27 17:32:10 PST 2012
selfserv with PID 87143 started at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #986: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87143 at Tue Nov 27 17:32:10 PST 2012
kill -USR1 87143
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87143 killed at Tue Nov 27 17:32:10 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87202 >/dev/null 2>/dev/null
selfserv with PID 87202 found at Tue Nov 27 17:32:10 PST 2012
selfserv with PID 87202 started at Tue Nov 27 17:32:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #987: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87202 at Tue Nov 27 17:32:11 PST 2012
kill -USR1 87202
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87202 killed at Tue Nov 27 17:32:11 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87249 >/dev/null 2>/dev/null
selfserv with PID 87249 found at Tue Nov 27 17:32:11 PST 2012
selfserv with PID 87249 started at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #988: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87249 at Tue Nov 27 17:32:11 PST 2012
kill -USR1 87249
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87249 killed at Tue Nov 27 17:32:11 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:32:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87296 >/dev/null 2>/dev/null
selfserv with PID 87296 found at Tue Nov 27 17:32:11 PST 2012
selfserv with PID 87296 started at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #989: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87296 at Tue Nov 27 17:32:11 PST 2012
kill -USR1 87296
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87296 killed at Tue Nov 27 17:32:11 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87355 >/dev/null 2>/dev/null
selfserv with PID 87355 found at Tue Nov 27 17:32:11 PST 2012
selfserv with PID 87355 started at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #990: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87355 at Tue Nov 27 17:32:11 PST 2012
kill -USR1 87355
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87355 killed at Tue Nov 27 17:32:11 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87402 >/dev/null 2>/dev/null
selfserv with PID 87402 found at Tue Nov 27 17:32:11 PST 2012
selfserv with PID 87402 started at Tue Nov 27 17:32:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 87402 at Tue Nov 27 17:32:12 PST 2012
kill -USR1 87402
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87402 killed at Tue Nov 27 17:32:12 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:32:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87449 >/dev/null 2>/dev/null
selfserv with PID 87449 found at Tue Nov 27 17:32:12 PST 2012
selfserv with PID 87449 started at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #992: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 87449 at Tue Nov 27 17:32:12 PST 2012
kill -USR1 87449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87449 killed at Tue Nov 27 17:32:12 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87517 >/dev/null 2>/dev/null
selfserv with PID 87517 found at Tue Nov 27 17:32:12 PST 2012
selfserv with PID 87517 started at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #993: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 87517 at Tue Nov 27 17:32:12 PST 2012
kill -USR1 87517
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87517 killed at Tue Nov 27 17:32:12 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87564 >/dev/null 2>/dev/null
selfserv with PID 87564 found at Tue Nov 27 17:32:12 PST 2012
selfserv with PID 87564 started at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 87564 at Tue Nov 27 17:32:12 PST 2012
kill -USR1 87564
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87564 killed at Tue Nov 27 17:32:12 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87611 >/dev/null 2>/dev/null
selfserv with PID 87611 found at Tue Nov 27 17:32:12 PST 2012
selfserv with PID 87611 started at Tue Nov 27 17:32:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #995: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 87611 at Tue Nov 27 17:32:13 PST 2012
kill -USR1 87611
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87611 killed at Tue Nov 27 17:32:13 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87670 >/dev/null 2>/dev/null
selfserv with PID 87670 found at Tue Nov 27 17:32:13 PST 2012
selfserv with PID 87670 started at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #996: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 87670 at Tue Nov 27 17:32:13 PST 2012
kill -USR1 87670
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87670 killed at Tue Nov 27 17:32:13 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87717 >/dev/null 2>/dev/null
selfserv with PID 87717 found at Tue Nov 27 17:32:13 PST 2012
selfserv with PID 87717 started at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #997: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 87717 at Tue Nov 27 17:32:13 PST 2012
kill -USR1 87717
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87717 killed at Tue Nov 27 17:32:13 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87764 >/dev/null 2>/dev/null
selfserv with PID 87764 found at Tue Nov 27 17:32:13 PST 2012
selfserv with PID 87764 started at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #998: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 87764 at Tue Nov 27 17:32:13 PST 2012
kill -USR1 87764
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87764 killed at Tue Nov 27 17:32:13 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87823 >/dev/null 2>/dev/null
selfserv with PID 87823 found at Tue Nov 27 17:32:13 PST 2012
selfserv with PID 87823 started at Tue Nov 27 17:32:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #999: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 87823 at Tue Nov 27 17:32:14 PST 2012
kill -USR1 87823
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87823 killed at Tue Nov 27 17:32:14 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87870 >/dev/null 2>/dev/null
selfserv with PID 87870 found at Tue Nov 27 17:32:14 PST 2012
selfserv with PID 87870 started at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1000: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 87870 at Tue Nov 27 17:32:14 PST 2012
kill -USR1 87870
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87870 killed at Tue Nov 27 17:32:14 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87917 >/dev/null 2>/dev/null
selfserv with PID 87917 found at Tue Nov 27 17:32:14 PST 2012
selfserv with PID 87917 started at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1001: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 87917 at Tue Nov 27 17:32:14 PST 2012
kill -USR1 87917
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87917 killed at Tue Nov 27 17:32:14 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 87976 >/dev/null 2>/dev/null
selfserv with PID 87976 found at Tue Nov 27 17:32:14 PST 2012
selfserv with PID 87976 started at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1002: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 87976 at Tue Nov 27 17:32:14 PST 2012
kill -USR1 87976
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 87976 killed at Tue Nov 27 17:32:14 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88023 >/dev/null 2>/dev/null
selfserv with PID 88023 found at Tue Nov 27 17:32:14 PST 2012
selfserv with PID 88023 started at Tue Nov 27 17:32:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1003: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88023 at Tue Nov 27 17:32:15 PST 2012
kill -USR1 88023
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88023 killed at Tue Nov 27 17:32:15 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88070 >/dev/null 2>/dev/null
selfserv with PID 88070 found at Tue Nov 27 17:32:15 PST 2012
selfserv with PID 88070 started at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1004: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88070 at Tue Nov 27 17:32:15 PST 2012
kill -USR1 88070
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88070 killed at Tue Nov 27 17:32:15 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88129 >/dev/null 2>/dev/null
selfserv with PID 88129 found at Tue Nov 27 17:32:15 PST 2012
selfserv with PID 88129 started at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1005: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88129 at Tue Nov 27 17:32:15 PST 2012
kill -USR1 88129
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88129 killed at Tue Nov 27 17:32:15 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88176 >/dev/null 2>/dev/null
selfserv with PID 88176 found at Tue Nov 27 17:32:15 PST 2012
selfserv with PID 88176 started at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1006: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88176 at Tue Nov 27 17:32:15 PST 2012
kill -USR1 88176
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88176 killed at Tue Nov 27 17:32:15 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88223 >/dev/null 2>/dev/null
selfserv with PID 88223 found at Tue Nov 27 17:32:15 PST 2012
selfserv with PID 88223 started at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1007: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88223 at Tue Nov 27 17:32:16 PST 2012
kill -USR1 88223
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88223 killed at Tue Nov 27 17:32:16 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88282 >/dev/null 2>/dev/null
selfserv with PID 88282 found at Tue Nov 27 17:32:16 PST 2012
selfserv with PID 88282 started at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1008: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88282 at Tue Nov 27 17:32:16 PST 2012
kill -USR1 88282
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88282 killed at Tue Nov 27 17:32:16 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88329 >/dev/null 2>/dev/null
selfserv with PID 88329 found at Tue Nov 27 17:32:16 PST 2012
selfserv with PID 88329 started at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88329 at Tue Nov 27 17:32:16 PST 2012
kill -USR1 88329
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88329 killed at Tue Nov 27 17:32:16 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88376 >/dev/null 2>/dev/null
selfserv with PID 88376 found at Tue Nov 27 17:32:16 PST 2012
selfserv with PID 88376 started at Tue Nov 27 17:32:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1010: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88376 at Tue Nov 27 17:32:16 PST 2012
kill -USR1 88376
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88376 killed at Tue Nov 27 17:32:16 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88435 >/dev/null 2>/dev/null
selfserv with PID 88435 found at Tue Nov 27 17:32:17 PST 2012
selfserv with PID 88435 started at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1011: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88435 at Tue Nov 27 17:32:17 PST 2012
kill -USR1 88435
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88435 killed at Tue Nov 27 17:32:17 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88482 >/dev/null 2>/dev/null
selfserv with PID 88482 found at Tue Nov 27 17:32:17 PST 2012
selfserv with PID 88482 started at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1012: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88482 at Tue Nov 27 17:32:17 PST 2012
kill -USR1 88482
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88482 killed at Tue Nov 27 17:32:17 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88529 >/dev/null 2>/dev/null
selfserv with PID 88529 found at Tue Nov 27 17:32:17 PST 2012
selfserv with PID 88529 started at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1013: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88529 at Tue Nov 27 17:32:17 PST 2012
kill -USR1 88529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88529 killed at Tue Nov 27 17:32:17 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88588 >/dev/null 2>/dev/null
selfserv with PID 88588 found at Tue Nov 27 17:32:17 PST 2012
selfserv with PID 88588 started at Tue Nov 27 17:32:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88588 at Tue Nov 27 17:32:18 PST 2012
kill -USR1 88588
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88588 killed at Tue Nov 27 17:32:18 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88637 >/dev/null 2>/dev/null
selfserv with PID 88637 found at Tue Nov 27 17:32:18 PST 2012
selfserv with PID 88637 started at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88637 at Tue Nov 27 17:32:18 PST 2012
kill -USR1 88637
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88637 killed at Tue Nov 27 17:32:18 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88684 >/dev/null 2>/dev/null
selfserv with PID 88684 found at Tue Nov 27 17:32:18 PST 2012
selfserv with PID 88684 started at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 88684 at Tue Nov 27 17:32:18 PST 2012
kill -USR1 88684
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88684 killed at Tue Nov 27 17:32:18 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88743 >/dev/null 2>/dev/null
selfserv with PID 88743 found at Tue Nov 27 17:32:18 PST 2012
selfserv with PID 88743 started at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1017: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88743 at Tue Nov 27 17:32:18 PST 2012
kill -USR1 88743
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88743 killed at Tue Nov 27 17:32:18 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88790 >/dev/null 2>/dev/null
selfserv with PID 88790 found at Tue Nov 27 17:32:18 PST 2012
selfserv with PID 88790 started at Tue Nov 27 17:32:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88790 at Tue Nov 27 17:32:19 PST 2012
kill -USR1 88790
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88790 killed at Tue Nov 27 17:32:19 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88837 >/dev/null 2>/dev/null
selfserv with PID 88837 found at Tue Nov 27 17:32:19 PST 2012
selfserv with PID 88837 started at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1019: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88837 at Tue Nov 27 17:32:19 PST 2012
kill -USR1 88837
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88837 killed at Tue Nov 27 17:32:19 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88896 >/dev/null 2>/dev/null
selfserv with PID 88896 found at Tue Nov 27 17:32:19 PST 2012
selfserv with PID 88896 started at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 88896 at Tue Nov 27 17:32:19 PST 2012
kill -USR1 88896
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88896 killed at Tue Nov 27 17:32:19 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88943 >/dev/null 2>/dev/null
selfserv with PID 88943 found at Tue Nov 27 17:32:19 PST 2012
selfserv with PID 88943 started at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 88943 at Tue Nov 27 17:32:19 PST 2012
kill -USR1 88943
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88943 killed at Tue Nov 27 17:32:19 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 88990 >/dev/null 2>/dev/null
selfserv with PID 88990 found at Tue Nov 27 17:32:19 PST 2012
selfserv with PID 88990 started at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1022: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 88990 at Tue Nov 27 17:32:20 PST 2012
kill -USR1 88990
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 88990 killed at Tue Nov 27 17:32:20 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89049 >/dev/null 2>/dev/null
selfserv with PID 89049 found at Tue Nov 27 17:32:20 PST 2012
selfserv with PID 89049 started at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1023: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89049 at Tue Nov 27 17:32:20 PST 2012
kill -USR1 89049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89049 killed at Tue Nov 27 17:32:20 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89096 >/dev/null 2>/dev/null
selfserv with PID 89096 found at Tue Nov 27 17:32:20 PST 2012
selfserv with PID 89096 started at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1024: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89096 at Tue Nov 27 17:32:20 PST 2012
kill -USR1 89096
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89096 killed at Tue Nov 27 17:32:20 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89143 >/dev/null 2>/dev/null
selfserv with PID 89143 found at Tue Nov 27 17:32:20 PST 2012
selfserv with PID 89143 started at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1025: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89143 at Tue Nov 27 17:32:20 PST 2012
kill -USR1 89143
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89143 killed at Tue Nov 27 17:32:20 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89202 >/dev/null 2>/dev/null
selfserv with PID 89202 found at Tue Nov 27 17:32:20 PST 2012
selfserv with PID 89202 started at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1026: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89202 at Tue Nov 27 17:32:21 PST 2012
kill -USR1 89202
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89202 killed at Tue Nov 27 17:32:21 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89249 >/dev/null 2>/dev/null
selfserv with PID 89249 found at Tue Nov 27 17:32:21 PST 2012
selfserv with PID 89249 started at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89249 at Tue Nov 27 17:32:21 PST 2012
kill -USR1 89249
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89249 killed at Tue Nov 27 17:32:21 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89296 >/dev/null 2>/dev/null
selfserv with PID 89296 found at Tue Nov 27 17:32:21 PST 2012
selfserv with PID 89296 started at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1028: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89296 at Tue Nov 27 17:32:21 PST 2012
kill -USR1 89296
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89296 killed at Tue Nov 27 17:32:21 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89355 >/dev/null 2>/dev/null
selfserv with PID 89355 found at Tue Nov 27 17:32:21 PST 2012
selfserv with PID 89355 started at Tue Nov 27 17:32:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1029: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89355 at Tue Nov 27 17:32:21 PST 2012
kill -USR1 89355
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89355 killed at Tue Nov 27 17:32:21 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89402 >/dev/null 2>/dev/null
selfserv with PID 89402 found at Tue Nov 27 17:32:22 PST 2012
selfserv with PID 89402 started at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1030: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89402 at Tue Nov 27 17:32:22 PST 2012
kill -USR1 89402
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89402 killed at Tue Nov 27 17:32:22 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89449 >/dev/null 2>/dev/null
selfserv with PID 89449 found at Tue Nov 27 17:32:22 PST 2012
selfserv with PID 89449 started at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1031: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89449 at Tue Nov 27 17:32:22 PST 2012
kill -USR1 89449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89449 killed at Tue Nov 27 17:32:22 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89508 >/dev/null 2>/dev/null
selfserv with PID 89508 found at Tue Nov 27 17:32:22 PST 2012
selfserv with PID 89508 started at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1032: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89508 at Tue Nov 27 17:32:22 PST 2012
kill -USR1 89508
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89508 killed at Tue Nov 27 17:32:22 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89555 >/dev/null 2>/dev/null
selfserv with PID 89555 found at Tue Nov 27 17:32:22 PST 2012
selfserv with PID 89555 started at Tue Nov 27 17:32:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89555 at Tue Nov 27 17:32:23 PST 2012
kill -USR1 89555
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89555 killed at Tue Nov 27 17:32:23 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89602 >/dev/null 2>/dev/null
selfserv with PID 89602 found at Tue Nov 27 17:32:23 PST 2012
selfserv with PID 89602 started at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1034: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89602 at Tue Nov 27 17:32:23 PST 2012
kill -USR1 89602
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89602 killed at Tue Nov 27 17:32:23 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89661 >/dev/null 2>/dev/null
selfserv with PID 89661 found at Tue Nov 27 17:32:23 PST 2012
selfserv with PID 89661 started at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1035: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89661 at Tue Nov 27 17:32:23 PST 2012
kill -USR1 89661
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89661 killed at Tue Nov 27 17:32:23 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89708 >/dev/null 2>/dev/null
selfserv with PID 89708 found at Tue Nov 27 17:32:23 PST 2012
selfserv with PID 89708 started at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1036: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89708 at Tue Nov 27 17:32:23 PST 2012
kill -USR1 89708
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89708 killed at Tue Nov 27 17:32:23 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89755 >/dev/null 2>/dev/null
selfserv with PID 89755 found at Tue Nov 27 17:32:23 PST 2012
selfserv with PID 89755 started at Tue Nov 27 17:32:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1037: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89755 at Tue Nov 27 17:32:24 PST 2012
kill -USR1 89755
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89755 killed at Tue Nov 27 17:32:24 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89814 >/dev/null 2>/dev/null
selfserv with PID 89814 found at Tue Nov 27 17:32:24 PST 2012
selfserv with PID 89814 started at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89814 at Tue Nov 27 17:32:24 PST 2012
kill -USR1 89814
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89814 killed at Tue Nov 27 17:32:24 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89861 >/dev/null 2>/dev/null
selfserv with PID 89861 found at Tue Nov 27 17:32:24 PST 2012
selfserv with PID 89861 started at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89861 at Tue Nov 27 17:32:24 PST 2012
kill -USR1 89861
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89861 killed at Tue Nov 27 17:32:24 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89908 >/dev/null 2>/dev/null
selfserv with PID 89908 found at Tue Nov 27 17:32:24 PST 2012
selfserv with PID 89908 started at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 89908 at Tue Nov 27 17:32:24 PST 2012
kill -USR1 89908
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89908 killed at Tue Nov 27 17:32:24 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 89967 >/dev/null 2>/dev/null
selfserv with PID 89967 found at Tue Nov 27 17:32:24 PST 2012
selfserv with PID 89967 started at Tue Nov 27 17:32:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1041: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 89967 at Tue Nov 27 17:32:25 PST 2012
kill -USR1 89967
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 89967 killed at Tue Nov 27 17:32:25 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90014 >/dev/null 2>/dev/null
selfserv with PID 90014 found at Tue Nov 27 17:32:25 PST 2012
selfserv with PID 90014 started at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1042: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 90014 at Tue Nov 27 17:32:25 PST 2012
kill -USR1 90014
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90014 killed at Tue Nov 27 17:32:25 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90061 >/dev/null 2>/dev/null
selfserv with PID 90061 found at Tue Nov 27 17:32:25 PST 2012
selfserv with PID 90061 started at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1043: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 90061 at Tue Nov 27 17:32:25 PST 2012
kill -USR1 90061
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90061 killed at Tue Nov 27 17:32:25 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90120 >/dev/null 2>/dev/null
selfserv with PID 90120 found at Tue Nov 27 17:32:25 PST 2012
selfserv with PID 90120 started at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90120 at Tue Nov 27 17:32:25 PST 2012
kill -USR1 90120
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90120 killed at Tue Nov 27 17:32:25 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90167 >/dev/null 2>/dev/null
selfserv with PID 90167 found at Tue Nov 27 17:32:26 PST 2012
selfserv with PID 90167 started at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 90167 at Tue Nov 27 17:32:26 PST 2012
kill -USR1 90167
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90167 killed at Tue Nov 27 17:32:26 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90214 >/dev/null 2>/dev/null
selfserv with PID 90214 found at Tue Nov 27 17:32:26 PST 2012
selfserv with PID 90214 started at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90214 at Tue Nov 27 17:32:26 PST 2012
kill -USR1 90214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90214 killed at Tue Nov 27 17:32:26 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90273 >/dev/null 2>/dev/null
selfserv with PID 90273 found at Tue Nov 27 17:32:26 PST 2012
selfserv with PID 90273 started at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1047: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90273 at Tue Nov 27 17:32:26 PST 2012
kill -USR1 90273
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90273 killed at Tue Nov 27 17:32:26 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90320 >/dev/null 2>/dev/null
selfserv with PID 90320 found at Tue Nov 27 17:32:26 PST 2012
selfserv with PID 90320 started at Tue Nov 27 17:32:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1048: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90320 at Tue Nov 27 17:32:26 PST 2012
kill -USR1 90320
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90320 killed at Tue Nov 27 17:32:26 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:32:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90367 >/dev/null 2>/dev/null
selfserv with PID 90367 found at Tue Nov 27 17:32:27 PST 2012
selfserv with PID 90367 started at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1049: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90367 at Tue Nov 27 17:32:27 PST 2012
kill -USR1 90367
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90367 killed at Tue Nov 27 17:32:27 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90426 >/dev/null 2>/dev/null
selfserv with PID 90426 found at Tue Nov 27 17:32:27 PST 2012
selfserv with PID 90426 started at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90426 at Tue Nov 27 17:32:27 PST 2012
kill -USR1 90426
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90426 killed at Tue Nov 27 17:32:27 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90473 >/dev/null 2>/dev/null
selfserv with PID 90473 found at Tue Nov 27 17:32:27 PST 2012
selfserv with PID 90473 started at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 90473 at Tue Nov 27 17:32:27 PST 2012
kill -USR1 90473
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90473 killed at Tue Nov 27 17:32:27 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90520 >/dev/null 2>/dev/null
selfserv with PID 90520 found at Tue Nov 27 17:32:27 PST 2012
selfserv with PID 90520 started at Tue Nov 27 17:32:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 90520 at Tue Nov 27 17:32:28 PST 2012
kill -USR1 90520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90520 killed at Tue Nov 27 17:32:28 PST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/authin.tl.tmp
0
selfserv starting at Tue Nov 27 17:32:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
selfserv with PID 90574 started at Tue Nov 27 17:32:28 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
ssl.sh: #1053: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
ssl.sh: #1054: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
ssl.sh: #1055: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
ssl.sh: #1056: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
ssl.sh: #1057: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:28 PST 2012
ssl.sh: #1058: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:29 PST 2012
ssl.sh: #1059: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:29 PST 2012
ssl.sh: #1060: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:29 PST 2012
ssl.sh: #1061: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:29 PST 2012
ssl.sh: #1062: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:29 PST 2012
ssl.sh: #1063: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:29 PST 2012
ssl.sh: #1064: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
ssl.sh: #1065: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
================= CRL Reloaded =============
ssl.sh: #1066: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
ssl.sh: #1067: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
ssl.sh: #1068: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
ssl.sh: #1069: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
ssl.sh: #1070: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:30 PST 2012
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:31 PST 2012
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:31 PST 2012
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:31 PST 2012
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:31 PST 2012
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:31 PST 2012
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:31 PST 2012
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1078: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
================= CRL Reloaded =============
ssl.sh: #1080: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1084: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:32 PST 2012
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:33 PST 2012
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:33 PST 2012
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:33 PST 2012
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:33 PST 2012
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:34 PST 2012
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:34 PST 2012
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:34 PST 2012
ssl.sh: #1092: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 90574 >/dev/null 2>/dev/null
selfserv with PID 90574 found at Tue Nov 27 17:32:34 PST 2012
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 90574 at Tue Nov 27 17:32:34 PST 2012
kill -USR1 90574
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 90574 killed at Tue Nov 27 17:32:34 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:32:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:34 PST 2012
selfserv with PID 91985 started at Tue Nov 27 17:32:34 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:34 PST 2012
ssl.sh: #1094: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:34 PST 2012
ssl.sh: #1095: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:35 PST 2012
ssl.sh: #1096: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:35 PST 2012
ssl.sh: #1097: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:35 PST 2012
ssl.sh: #1098: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:35 PST 2012
ssl.sh: #1099: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:35 PST 2012
ssl.sh: #1100: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:35 PST 2012
ssl.sh: #1101: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
ssl.sh: #1102: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
ssl.sh: #1103: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
ssl.sh: #1104: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
ssl.sh: #1105: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
ssl.sh: #1106: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
================= CRL Reloaded =============
ssl.sh: #1107: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:36 PST 2012
ssl.sh: #1108: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1109: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1110: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1111: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:37 PST 2012
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
ssl.sh: #1119: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
================= CRL Reloaded =============
ssl.sh: #1121: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:38 PST 2012
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:39 PST 2012
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:39 PST 2012
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:39 PST 2012
ssl.sh: #1125: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:39 PST 2012
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:39 PST 2012
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:39 PST 2012
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:40 PST 2012
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:40 PST 2012
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:40 PST 2012
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:40 PST 2012
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:40 PST 2012
ssl.sh: #1133: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 91985 >/dev/null 2>/dev/null
selfserv with PID 91985 found at Tue Nov 27 17:32:40 PST 2012
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91985 at Tue Nov 27 17:32:40 PST 2012
kill -USR1 91985
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91985 killed at Tue Nov 27 17:32:40 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:32:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:40 PST 2012
selfserv with PID 93396 started at Tue Nov 27 17:32:40 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:41 PST 2012
ssl.sh: #1135: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:41 PST 2012
ssl.sh: #1136: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:41 PST 2012
ssl.sh: #1137: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:41 PST 2012
ssl.sh: #1138: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:41 PST 2012
ssl.sh: #1139: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:41 PST 2012
ssl.sh: #1140: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:42 PST 2012
ssl.sh: #1141: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:42 PST 2012
ssl.sh: #1142: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:42 PST 2012
ssl.sh: #1143: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:42 PST 2012
ssl.sh: #1144: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:42 PST 2012
ssl.sh: #1145: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:42 PST 2012
ssl.sh: #1146: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:43 PST 2012
ssl.sh: #1147: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:43 PST 2012
================= CRL Reloaded =============
ssl.sh: #1148: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:43 PST 2012
ssl.sh: #1149: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:43 PST 2012
ssl.sh: #1150: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:43 PST 2012
ssl.sh: #1151: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:43 PST 2012
ssl.sh: #1152: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:44 PST 2012
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:44 PST 2012
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:44 PST 2012
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:44 PST 2012
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:44 PST 2012
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:44 PST 2012
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:45 PST 2012
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:45 PST 2012
ssl.sh: #1160: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:45 PST 2012
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:45 PST 2012
================= CRL Reloaded =============
ssl.sh: #1162: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:45 PST 2012
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:45 PST 2012
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:46 PST 2012
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:46 PST 2012
ssl.sh: #1166: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:46 PST 2012
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:46 PST 2012
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:46 PST 2012
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:46 PST 2012
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:47 PST 2012
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:47 PST 2012
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:47 PST 2012
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:47 PST 2012
ssl.sh: #1174: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 93396 >/dev/null 2>/dev/null
selfserv with PID 93396 found at Tue Nov 27 17:32:47 PST 2012
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 93396 at Tue Nov 27 17:32:47 PST 2012
kill -USR1 93396
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93396 killed at Tue Nov 27 17:32:47 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:47 PST 2012
selfserv with PID 94817 started at Tue Nov 27 17:32:47 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:48 PST 2012
ssl.sh: #1176: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:48 PST 2012
ssl.sh: #1177: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:48 PST 2012
ssl.sh: #1178: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:48 PST 2012
ssl.sh: #1179: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:48 PST 2012
ssl.sh: #1180: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:48 PST 2012
ssl.sh: #1181: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:49 PST 2012
ssl.sh: #1182: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:49 PST 2012
ssl.sh: #1183: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:49 PST 2012
ssl.sh: #1184: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:49 PST 2012
ssl.sh: #1185: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:49 PST 2012
ssl.sh: #1186: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:49 PST 2012
ssl.sh: #1187: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:50 PST 2012
ssl.sh: #1188: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:50 PST 2012
================= CRL Reloaded =============
ssl.sh: #1189: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:50 PST 2012
ssl.sh: #1190: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:50 PST 2012
ssl.sh: #1191: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:50 PST 2012
ssl.sh: #1192: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:50 PST 2012
ssl.sh: #1193: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:51 PST 2012
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:51 PST 2012
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:51 PST 2012
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:51 PST 2012
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:51 PST 2012
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:51 PST 2012
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:52 PST 2012
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:52 PST 2012
ssl.sh: #1201: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:52 PST 2012
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:52 PST 2012
================= CRL Reloaded =============
ssl.sh: #1203: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:52 PST 2012
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:52 PST 2012
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:53 PST 2012
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:53 PST 2012
ssl.sh: #1207: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:53 PST 2012
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:53 PST 2012
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:53 PST 2012
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:53 PST 2012
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:54 PST 2012
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:54 PST 2012
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:54 PST 2012
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:54 PST 2012
ssl.sh: #1215: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 94817 >/dev/null 2>/dev/null
selfserv with PID 94817 found at Tue Nov 27 17:32:54 PST 2012
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 94817 at Tue Nov 27 17:32:54 PST 2012
kill -USR1 94817
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94817 killed at Tue Nov 27 17:32:54 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:32:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96228 >/dev/null 2>/dev/null
selfserv with PID 96228 found at Tue Nov 27 17:32:54 PST 2012
selfserv with PID 96228 started at Tue Nov 27 17:32:54 PST 2012
trying to kill selfserv with PID 96228 at Tue Nov 27 17:32:54 PST 2012
kill -USR1 96228
./ssl.sh: line 173: 96228 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 96228 killed at Tue Nov 27 17:32:54 PST 2012
selfserv starting at Tue Nov 27 17:32:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:32:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:54 PST 2012
selfserv with PID 96261 started at Tue Nov 27 17:32:54 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:55 PST 2012
ssl.sh: #1217: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:55 PST 2012
ssl.sh: #1218: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:55 PST 2012
ssl.sh: #1219: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:55 PST 2012
ssl.sh: #1220: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:55 PST 2012
ssl.sh: #1221: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:55 PST 2012
ssl.sh: #1222: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1223: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1224: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1225: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1226: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1227: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1228: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:56 PST 2012
ssl.sh: #1229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
================= CRL Reloaded =============
ssl.sh: #1230: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
ssl.sh: #1231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
ssl.sh: #1232: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
ssl.sh: #1233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
ssl.sh: #1234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:57 PST 2012
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:58 PST 2012
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:58 PST 2012
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:58 PST 2012
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:58 PST 2012
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:58 PST 2012
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:58 PST 2012
ssl.sh: #1242: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
================= CRL Reloaded =============
ssl.sh: #1244: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
ssl.sh: #1248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:32:59 PST 2012
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:00 PST 2012
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:00 PST 2012
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:00 PST 2012
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:00 PST 2012
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:00 PST 2012
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:00 PST 2012
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:01 PST 2012
ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:33:01 PST 2012
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 96261 at Tue Nov 27 17:33:01 PST 2012
kill -USR1 96261
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96261 killed at Tue Nov 27 17:33:01 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:33:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:01 PST 2012
selfserv with PID 97672 started at Tue Nov 27 17:33:01 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:01 PST 2012
ssl.sh: #1258: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:01 PST 2012
ssl.sh: #1259: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:01 PST 2012
ssl.sh: #1260: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:01 PST 2012
ssl.sh: #1261: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1265: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1266: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1267: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:02 PST 2012
ssl.sh: #1268: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:03 PST 2012
ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:03 PST 2012
ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:03 PST 2012
================= CRL Reloaded =============
ssl.sh: #1271: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:03 PST 2012
ssl.sh: #1272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:04 PST 2012
ssl.sh: #1273: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:04 PST 2012
ssl.sh: #1274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:04 PST 2012
ssl.sh: #1275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:04 PST 2012
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:04 PST 2012
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:04 PST 2012
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:05 PST 2012
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:05 PST 2012
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:05 PST 2012
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:05 PST 2012
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:05 PST 2012
ssl.sh: #1283: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:05 PST 2012
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
================= CRL Reloaded =============
ssl.sh: #1285: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
ssl.sh: #1289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:06 PST 2012
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:07 PST 2012
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:07 PST 2012
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:07 PST 2012
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:07 PST 2012
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:07 PST 2012
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:07 PST 2012
ssl.sh: #1297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 97672 >/dev/null 2>/dev/null
selfserv with PID 97672 found at Tue Nov 27 17:33:08 PST 2012
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97672 at Tue Nov 27 17:33:08 PST 2012
kill -USR1 97672
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97672 killed at Tue Nov 27 17:33:08 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:33:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:08 PST 2012
selfserv with PID 99083 started at Tue Nov 27 17:33:08 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:08 PST 2012
ssl.sh: #1299: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:08 PST 2012
ssl.sh: #1300: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:08 PST 2012
ssl.sh: #1301: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:08 PST 2012
ssl.sh: #1302: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:08 PST 2012
ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1304: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1305: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1306: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1307: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1308: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1309: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:09 PST 2012
ssl.sh: #1310: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
ssl.sh: #1311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
================= CRL Reloaded =============
ssl.sh: #1312: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
ssl.sh: #1313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
ssl.sh: #1314: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
ssl.sh: #1315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
ssl.sh: #1316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:10 PST 2012
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:11 PST 2012
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:11 PST 2012
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:11 PST 2012
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:11 PST 2012
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:11 PST 2012
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:11 PST 2012
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
ssl.sh: #1324: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
================= CRL Reloaded =============
ssl.sh: #1326: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:12 PST 2012
ssl.sh: #1330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:13 PST 2012
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:13 PST 2012
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:13 PST 2012
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:13 PST 2012
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:13 PST 2012
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:13 PST 2012
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:14 PST 2012
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:14 PST 2012
ssl.sh: #1338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 99083 >/dev/null 2>/dev/null
selfserv with PID 99083 found at Tue Nov 27 17:33:14 PST 2012
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99083 at Tue Nov 27 17:33:14 PST 2012
kill -USR1 99083
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99083 killed at Tue Nov 27 17:33:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:33:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:14 PST 2012
selfserv with PID 623 started at Tue Nov 27 17:33:14 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:14 PST 2012
ssl.sh: #1340: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:14 PST 2012
ssl.sh: #1341: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:15 PST 2012
ssl.sh: #1342: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:15 PST 2012
ssl.sh: #1343: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:15 PST 2012
ssl.sh: #1344: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:15 PST 2012
ssl.sh: #1345: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:15 PST 2012
ssl.sh: #1346: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:15 PST 2012
ssl.sh: #1347: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:16 PST 2012
ssl.sh: #1348: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:16 PST 2012
ssl.sh: #1349: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:16 PST 2012
ssl.sh: #1350: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:16 PST 2012
ssl.sh: #1351: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:16 PST 2012
ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:16 PST 2012
================= CRL Reloaded =============
ssl.sh: #1353: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:17 PST 2012
ssl.sh: #1354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:17 PST 2012
ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:17 PST 2012
ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:17 PST 2012
ssl.sh: #1357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:17 PST 2012
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:17 PST 2012
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:18 PST 2012
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:18 PST 2012
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:18 PST 2012
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:18 PST 2012
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:18 PST 2012
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:18 PST 2012
ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:19 PST 2012
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:19 PST 2012
================= CRL Reloaded =============
ssl.sh: #1367: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:19 PST 2012
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:19 PST 2012
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:19 PST 2012
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:19 PST 2012
ssl.sh: #1371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:20 PST 2012
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:20 PST 2012
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:20 PST 2012
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:20 PST 2012
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:20 PST 2012
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:20 PST 2012
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:21 PST 2012
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:21 PST 2012
ssl.sh: #1379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 623 >/dev/null 2>/dev/null
selfserv with PID 623 found at Tue Nov 27 17:33:21 PST 2012
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 623 at Tue Nov 27 17:33:21 PST 2012
kill -USR1 623
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 623 killed at Tue Nov 27 17:33:21 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:33:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:21 PST 2012
selfserv with PID 2036 started at Tue Nov 27 17:33:21 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:21 PST 2012
ssl.sh: #1381: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:21 PST 2012
ssl.sh: #1382: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:22 PST 2012
ssl.sh: #1383: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:22 PST 2012
ssl.sh: #1384: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:22 PST 2012
ssl.sh: #1385: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:22 PST 2012
ssl.sh: #1386: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:22 PST 2012
ssl.sh: #1387: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:22 PST 2012
ssl.sh: #1388: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:23 PST 2012
ssl.sh: #1389: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:23 PST 2012
ssl.sh: #1390: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:23 PST 2012
ssl.sh: #1391: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:23 PST 2012
ssl.sh: #1392: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:23 PST 2012
ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:24 PST 2012
================= CRL Reloaded =============
ssl.sh: #1394: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:24 PST 2012
ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:24 PST 2012
ssl.sh: #1396: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:24 PST 2012
ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:24 PST 2012
ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:24 PST 2012
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:25 PST 2012
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:25 PST 2012
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:25 PST 2012
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:25 PST 2012
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:25 PST 2012
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:25 PST 2012
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:26 PST 2012
ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:26 PST 2012
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:26 PST 2012
================= CRL Reloaded =============
ssl.sh: #1408: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:26 PST 2012
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:26 PST 2012
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:26 PST 2012
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:27 PST 2012
ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:27 PST 2012
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:27 PST 2012
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:27 PST 2012
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:27 PST 2012
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:27 PST 2012
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:28 PST 2012
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:28 PST 2012
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:28 PST 2012
ssl.sh: #1420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2036 >/dev/null 2>/dev/null
selfserv with PID 2036 found at Tue Nov 27 17:33:28 PST 2012
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2036 at Tue Nov 27 17:33:28 PST 2012
kill -USR1 2036
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2036 killed at Tue Nov 27 17:33:28 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:33:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:28 PST 2012
selfserv with PID 3447 started at Tue Nov 27 17:33:28 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:28 PST 2012
ssl.sh: #1422: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:29 PST 2012
ssl.sh: #1423: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:29 PST 2012
ssl.sh: #1424: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:29 PST 2012
ssl.sh: #1425: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:29 PST 2012
ssl.sh: #1426: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:29 PST 2012
ssl.sh: #1427: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:29 PST 2012
ssl.sh: #1428: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:30 PST 2012
ssl.sh: #1429: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:30 PST 2012
ssl.sh: #1430: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:30 PST 2012
ssl.sh: #1431: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:30 PST 2012
ssl.sh: #1432: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:30 PST 2012
ssl.sh: #1433: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
================= CRL Reloaded =============
ssl.sh: #1435: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
ssl.sh: #1438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:31 PST 2012
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:32 PST 2012
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:32 PST 2012
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:32 PST 2012
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:32 PST 2012
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:32 PST 2012
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:33 PST 2012
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:33 PST 2012
ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:33 PST 2012
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:33 PST 2012
================= CRL Reloaded =============
ssl.sh: #1449: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:33 PST 2012
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:33 PST 2012
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:34 PST 2012
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:34 PST 2012
ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:34 PST 2012
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:34 PST 2012
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:35 PST 2012
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:35 PST 2012
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:35 PST 2012
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:35 PST 2012
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:35 PST 2012
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:35 PST 2012
ssl.sh: #1461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3447 >/dev/null 2>/dev/null
selfserv with PID 3447 found at Tue Nov 27 17:33:36 PST 2012
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3447 at Tue Nov 27 17:33:36 PST 2012
kill -USR1 3447
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3447 killed at Tue Nov 27 17:33:36 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:33:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4858 >/dev/null 2>/dev/null
selfserv with PID 4858 found at Tue Nov 27 17:33:36 PST 2012
selfserv with PID 4858 started at Tue Nov 27 17:33:36 PST 2012
trying to kill selfserv with PID 4858 at Tue Nov 27 17:33:36 PST 2012
kill -USR1 4858
./ssl.sh: line 173:  4858 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 4858 killed at Tue Nov 27 17:33:36 PST 2012
selfserv starting at Tue Nov 27 17:33:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:36 PST 2012
selfserv with PID 4891 started at Tue Nov 27 17:33:36 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:36 PST 2012
ssl.sh: #1463: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:36 PST 2012
ssl.sh: #1464: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:36 PST 2012
ssl.sh: #1465: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:36 PST 2012
ssl.sh: #1466: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:37 PST 2012
ssl.sh: #1467: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:37 PST 2012
ssl.sh: #1468: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:37 PST 2012
ssl.sh: #1469: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:37 PST 2012
ssl.sh: #1470: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:37 PST 2012
ssl.sh: #1471: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:37 PST 2012
ssl.sh: #1472: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
ssl.sh: #1473: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
ssl.sh: #1474: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
ssl.sh: #1475: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
================= CRL Reloaded =============
ssl.sh: #1476: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
ssl.sh: #1477: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
ssl.sh: #1478: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:38 PST 2012
ssl.sh: #1479: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1480: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:39 PST 2012
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:40 PST 2012
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:40 PST 2012
ssl.sh: #1488: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:40 PST 2012
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:40 PST 2012
================= CRL Reloaded =============
ssl.sh: #1490: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:40 PST 2012
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:40 PST 2012
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1494: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:41 PST 2012
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:42 PST 2012
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:42 PST 2012
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:42 PST 2012
ssl.sh: #1502: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4891 >/dev/null 2>/dev/null
selfserv with PID 4891 found at Tue Nov 27 17:33:42 PST 2012
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4891 at Tue Nov 27 17:33:42 PST 2012
kill -USR1 4891
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4891 killed at Tue Nov 27 17:33:42 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:33:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:42 PST 2012
selfserv with PID 6302 started at Tue Nov 27 17:33:42 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:42 PST 2012
ssl.sh: #1504: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1505: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1506: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1507: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1508: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1509: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1510: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:43 PST 2012
ssl.sh: #1511: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:44 PST 2012
ssl.sh: #1512: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:44 PST 2012
ssl.sh: #1513: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:44 PST 2012
ssl.sh: #1514: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:44 PST 2012
ssl.sh: #1515: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:44 PST 2012
ssl.sh: #1516: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:44 PST 2012
================= CRL Reloaded =============
ssl.sh: #1517: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1518: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1519: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1520: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:45 PST 2012
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:46 PST 2012
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:46 PST 2012
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:46 PST 2012
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:46 PST 2012
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:46 PST 2012
ssl.sh: #1529: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:46 PST 2012
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
================= CRL Reloaded =============
ssl.sh: #1531: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
ssl.sh: #1535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:47 PST 2012
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:48 PST 2012
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:48 PST 2012
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:48 PST 2012
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:48 PST 2012
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:48 PST 2012
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:48 PST 2012
ssl.sh: #1543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Tue Nov 27 17:33:49 PST 2012
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6302 at Tue Nov 27 17:33:49 PST 2012
kill -USR1 6302
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 6302 killed at Tue Nov 27 17:33:49 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:33:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:49 PST 2012
selfserv with PID 7723 started at Tue Nov 27 17:33:49 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:49 PST 2012
ssl.sh: #1545: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:49 PST 2012
ssl.sh: #1546: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:49 PST 2012
ssl.sh: #1547: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:49 PST 2012
ssl.sh: #1548: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:49 PST 2012
ssl.sh: #1549: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1550: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1551: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1552: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1553: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1554: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1555: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:50 PST 2012
ssl.sh: #1556: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:51 PST 2012
ssl.sh: #1557: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:51 PST 2012
================= CRL Reloaded =============
ssl.sh: #1558: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:51 PST 2012
ssl.sh: #1559: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:51 PST 2012
ssl.sh: #1560: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:51 PST 2012
ssl.sh: #1561: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:51 PST 2012
ssl.sh: #1562: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:52 PST 2012
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
================= CRL Reloaded =============
ssl.sh: #1572: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:53 PST 2012
ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:54 PST 2012
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:54 PST 2012
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:54 PST 2012
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:54 PST 2012
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:54 PST 2012
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:54 PST 2012
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:55 PST 2012
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:55 PST 2012
ssl.sh: #1584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7723 >/dev/null 2>/dev/null
selfserv with PID 7723 found at Tue Nov 27 17:33:55 PST 2012
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7723 at Tue Nov 27 17:33:55 PST 2012
kill -USR1 7723
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 7723 killed at Tue Nov 27 17:33:55 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:33:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:33:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:55 PST 2012
selfserv with PID 9134 started at Tue Nov 27 17:33:55 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:55 PST 2012
ssl.sh: #1586: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:55 PST 2012
ssl.sh: #1587: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:56 PST 2012
ssl.sh: #1588: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:56 PST 2012
ssl.sh: #1589: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:56 PST 2012
ssl.sh: #1590: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:56 PST 2012
ssl.sh: #1591: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:56 PST 2012
ssl.sh: #1592: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:56 PST 2012
ssl.sh: #1593: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:57 PST 2012
ssl.sh: #1594: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:57 PST 2012
ssl.sh: #1595: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:57 PST 2012
ssl.sh: #1596: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:57 PST 2012
ssl.sh: #1597: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:57 PST 2012
ssl.sh: #1598: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:57 PST 2012
================= CRL Reloaded =============
ssl.sh: #1599: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:58 PST 2012
ssl.sh: #1600: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:58 PST 2012
ssl.sh: #1601: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:58 PST 2012
ssl.sh: #1602: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:58 PST 2012
ssl.sh: #1603: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:58 PST 2012
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:58 PST 2012
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:59 PST 2012
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:59 PST 2012
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:59 PST 2012
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:59 PST 2012
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:59 PST 2012
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:33:59 PST 2012
ssl.sh: #1611: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:00 PST 2012
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:00 PST 2012
================= CRL Reloaded =============
ssl.sh: #1613: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:00 PST 2012
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:00 PST 2012
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:00 PST 2012
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:00 PST 2012
ssl.sh: #1617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:01 PST 2012
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:01 PST 2012
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:01 PST 2012
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:01 PST 2012
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:01 PST 2012
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:01 PST 2012
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:02 PST 2012
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:02 PST 2012
ssl.sh: #1625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9134 >/dev/null 2>/dev/null
selfserv with PID 9134 found at Tue Nov 27 17:34:02 PST 2012
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9134 at Tue Nov 27 17:34:02 PST 2012
kill -USR1 9134
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 9134 killed at Tue Nov 27 17:34:02 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:02 PST 2012
selfserv with PID 10545 started at Tue Nov 27 17:34:02 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:02 PST 2012
ssl.sh: #1627: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:02 PST 2012
ssl.sh: #1628: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:03 PST 2012
ssl.sh: #1629: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:03 PST 2012
ssl.sh: #1630: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:03 PST 2012
ssl.sh: #1631: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:03 PST 2012
ssl.sh: #1632: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:03 PST 2012
ssl.sh: #1633: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:03 PST 2012
ssl.sh: #1634: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:04 PST 2012
ssl.sh: #1635: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:04 PST 2012
ssl.sh: #1636: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:04 PST 2012
ssl.sh: #1637: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:04 PST 2012
ssl.sh: #1638: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:05 PST 2012
ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:05 PST 2012
================= CRL Reloaded =============
ssl.sh: #1640: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:05 PST 2012
ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:05 PST 2012
ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:05 PST 2012
ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:05 PST 2012
ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:06 PST 2012
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:06 PST 2012
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:06 PST 2012
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:06 PST 2012
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:06 PST 2012
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:06 PST 2012
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:07 PST 2012
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:07 PST 2012
ssl.sh: #1652: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:07 PST 2012
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:07 PST 2012
================= CRL Reloaded =============
ssl.sh: #1654: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:07 PST 2012
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:08 PST 2012
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:08 PST 2012
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:08 PST 2012
ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:08 PST 2012
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:08 PST 2012
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:08 PST 2012
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:09 PST 2012
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:09 PST 2012
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:09 PST 2012
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:09 PST 2012
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:09 PST 2012
ssl.sh: #1666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10545 >/dev/null 2>/dev/null
selfserv with PID 10545 found at Tue Nov 27 17:34:09 PST 2012
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10545 at Tue Nov 27 17:34:09 PST 2012
kill -USR1 10545
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 10545 killed at Tue Nov 27 17:34:09 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:10 PST 2012
selfserv with PID 11956 started at Tue Nov 27 17:34:10 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:10 PST 2012
ssl.sh: #1668: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:10 PST 2012
ssl.sh: #1669: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:10 PST 2012
ssl.sh: #1670: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:10 PST 2012
ssl.sh: #1671: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:10 PST 2012
ssl.sh: #1672: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:11 PST 2012
ssl.sh: #1673: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:11 PST 2012
ssl.sh: #1674: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:11 PST 2012
ssl.sh: #1675: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:11 PST 2012
ssl.sh: #1676: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:11 PST 2012
ssl.sh: #1677: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:11 PST 2012
ssl.sh: #1678: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:12 PST 2012
ssl.sh: #1679: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:12 PST 2012
ssl.sh: #1680: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:12 PST 2012
================= CRL Reloaded =============
ssl.sh: #1681: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:12 PST 2012
ssl.sh: #1682: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:12 PST 2012
ssl.sh: #1683: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:12 PST 2012
ssl.sh: #1684: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:13 PST 2012
ssl.sh: #1685: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:13 PST 2012
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:13 PST 2012
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:13 PST 2012
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:13 PST 2012
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:13 PST 2012
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:14 PST 2012
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:14 PST 2012
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:14 PST 2012
ssl.sh: #1693: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:14 PST 2012
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 167 bytes
tstclnt: Writing 167 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:14 PST 2012
================= CRL Reloaded =============
ssl.sh: #1695: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:14 PST 2012
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:15 PST 2012
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:15 PST 2012
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:15 PST 2012
ssl.sh: #1699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:15 PST 2012
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:15 PST 2012
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:15 PST 2012
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:16 PST 2012
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:16 PST 2012
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:16 PST 2012
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:16 PST 2012
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:16 PST 2012
ssl.sh: #1707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11956 >/dev/null 2>/dev/null
selfserv with PID 11956 found at Tue Nov 27 17:34:17 PST 2012
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11956 at Tue Nov 27 17:34:17 PST 2012
kill -USR1 11956
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 11956 killed at Tue Nov 27 17:34:17 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 13367 >/dev/null 2>/dev/null
selfserv with PID 13367 found at Tue Nov 27 17:34:17 PST 2012
selfserv with PID 13367 started at Tue Nov 27 17:34:17 PST 2012
trying to kill selfserv with PID 13367 at Tue Nov 27 17:34:17 PST 2012
kill -USR1 13367
./ssl.sh: line 173: 13367 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 13367 killed at Tue Nov 27 17:34:17 PST 2012
ssl.sh: SSL Cipher Coverage  - server bypass/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 17:34:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:17 PST 2012
selfserv with PID 13406 started at Tue Nov 27 17:34:17 PST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c A -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1709: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c B -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1710: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c C -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1711: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c D -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1712: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c E -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1713: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c F -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1714: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c B -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1715: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c C -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1716: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c E -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1717: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1718: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1719: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1720: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1721: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1722: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1723: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1724: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1725: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1726: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 13406 at Tue Nov 27 17:34:25 PST 2012
kill -USR1 13406
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 13406 killed at Tue Nov 27 17:34:25 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:34:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 14989 >/dev/null 2>/dev/null
selfserv with PID 14989 found at Tue Nov 27 17:34:25 PST 2012
selfserv with PID 14989 started at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14989 >/dev/null 2>/dev/null
selfserv with PID 14989 found at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14989 >/dev/null 2>/dev/null
selfserv with PID 14989 found at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14989 >/dev/null 2>/dev/null
selfserv with PID 14989 found at Tue Nov 27 17:34:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14989 >/dev/null 2>/dev/null
selfserv with PID 14989 found at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14989 at Tue Nov 27 17:34:26 PST 2012
kill -USR1 14989
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 14989 killed at Tue Nov 27 17:34:26 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:34:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:26 PST 2012
selfserv with PID 15128 started at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15128 >/dev/null 2>/dev/null
selfserv with PID 15128 found at Tue Nov 27 17:34:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15128 at Tue Nov 27 17:34:28 PST 2012
kill -USR1 15128
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 15128 killed at Tue Nov 27 17:34:28 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:34:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 15518 >/dev/null 2>/dev/null
selfserv with PID 15518 found at Tue Nov 27 17:34:28 PST 2012
selfserv with PID 15518 started at Tue Nov 27 17:34:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15518 >/dev/null 2>/dev/null
selfserv with PID 15518 found at Tue Nov 27 17:34:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15518 >/dev/null 2>/dev/null
selfserv with PID 15518 found at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15518 >/dev/null 2>/dev/null
selfserv with PID 15518 found at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15518 >/dev/null 2>/dev/null
selfserv with PID 15518 found at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15518 at Tue Nov 27 17:34:29 PST 2012
kill -USR1 15518
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 15518 killed at Tue Nov 27 17:34:29 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:34:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:29 PST 2012
selfserv with PID 15657 started at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15657 >/dev/null 2>/dev/null
selfserv with PID 15657 found at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15657 at Tue Nov 27 17:34:31 PST 2012
kill -USR1 15657
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 15657 killed at Tue Nov 27 17:34:31 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:34:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16033 >/dev/null 2>/dev/null
selfserv with PID 16033 found at Tue Nov 27 17:34:31 PST 2012
selfserv with PID 16033 started at Tue Nov 27 17:34:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16033 >/dev/null 2>/dev/null
selfserv with PID 16033 found at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16033 >/dev/null 2>/dev/null
selfserv with PID 16033 found at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16033 >/dev/null 2>/dev/null
selfserv with PID 16033 found at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16033 >/dev/null 2>/dev/null
selfserv with PID 16033 found at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16033 at Tue Nov 27 17:34:32 PST 2012
kill -USR1 16033
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16033 killed at Tue Nov 27 17:34:32 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:34:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16172 >/dev/null 2>/dev/null
selfserv with PID 16172 found at Tue Nov 27 17:34:32 PST 2012
selfserv with PID 16172 started at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16172 >/dev/null 2>/dev/null
selfserv with PID 16172 found at Tue Nov 27 17:34:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16172 >/dev/null 2>/dev/null
selfserv with PID 16172 found at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16172 >/dev/null 2>/dev/null
selfserv with PID 16172 found at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16172 >/dev/null 2>/dev/null
selfserv with PID 16172 found at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16172 at Tue Nov 27 17:34:33 PST 2012
kill -USR1 16172
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16172 killed at Tue Nov 27 17:34:33 PST 2012
ssl.sh: SSL Client Authentication  - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16362 >/dev/null 2>/dev/null
selfserv with PID 16362 found at Tue Nov 27 17:34:33 PST 2012
selfserv with PID 16362 started at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16362 at Tue Nov 27 17:34:33 PST 2012
kill -USR1 16362
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16362 killed at Tue Nov 27 17:34:33 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:34:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16410 >/dev/null 2>/dev/null
selfserv with PID 16410 found at Tue Nov 27 17:34:33 PST 2012
selfserv with PID 16410 started at Tue Nov 27 17:34:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16410 at Tue Nov 27 17:34:34 PST 2012
kill -USR1 16410
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16410 killed at Tue Nov 27 17:34:34 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:34:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16458 >/dev/null 2>/dev/null
selfserv with PID 16458 found at Tue Nov 27 17:34:34 PST 2012
selfserv with PID 16458 started at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16458 at Tue Nov 27 17:34:34 PST 2012
kill -USR1 16458
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16458 killed at Tue Nov 27 17:34:34 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16506 >/dev/null 2>/dev/null
selfserv with PID 16506 found at Tue Nov 27 17:34:34 PST 2012
selfserv with PID 16506 started at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1821: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16506 at Tue Nov 27 17:34:34 PST 2012
kill -USR1 16506
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16506 killed at Tue Nov 27 17:34:34 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:34:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16554 >/dev/null 2>/dev/null
selfserv with PID 16554 found at Tue Nov 27 17:34:34 PST 2012
selfserv with PID 16554 started at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1822: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16554 at Tue Nov 27 17:34:34 PST 2012
kill -USR1 16554
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16554 killed at Tue Nov 27 17:34:34 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:34:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16602 >/dev/null 2>/dev/null
selfserv with PID 16602 found at Tue Nov 27 17:34:34 PST 2012
selfserv with PID 16602 started at Tue Nov 27 17:34:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16602 at Tue Nov 27 17:34:34 PST 2012
kill -USR1 16602
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16602 killed at Tue Nov 27 17:34:34 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16650 >/dev/null 2>/dev/null
selfserv with PID 16650 found at Tue Nov 27 17:34:35 PST 2012
selfserv with PID 16650 started at Tue Nov 27 17:34:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16650 at Tue Nov 27 17:34:35 PST 2012
kill -USR1 16650
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16650 killed at Tue Nov 27 17:34:35 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:34:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16698 >/dev/null 2>/dev/null
selfserv with PID 16698 found at Tue Nov 27 17:34:35 PST 2012
selfserv with PID 16698 started at Tue Nov 27 17:34:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16698 at Tue Nov 27 17:34:35 PST 2012
kill -USR1 16698
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16698 killed at Tue Nov 27 17:34:35 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:34:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16746 >/dev/null 2>/dev/null
selfserv with PID 16746 found at Tue Nov 27 17:34:35 PST 2012
selfserv with PID 16746 started at Tue Nov 27 17:34:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16746 at Tue Nov 27 17:34:35 PST 2012
kill -USR1 16746
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16746 killed at Tue Nov 27 17:34:35 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16794 >/dev/null 2>/dev/null
selfserv with PID 16794 found at Tue Nov 27 17:34:36 PST 2012
selfserv with PID 16794 started at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1827: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16794 at Tue Nov 27 17:34:36 PST 2012
kill -USR1 16794
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16794 killed at Tue Nov 27 17:34:36 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:34:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16842 >/dev/null 2>/dev/null
selfserv with PID 16842 found at Tue Nov 27 17:34:36 PST 2012
selfserv with PID 16842 started at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1828: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16842 at Tue Nov 27 17:34:36 PST 2012
kill -USR1 16842
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16842 killed at Tue Nov 27 17:34:36 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:34:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16890 >/dev/null 2>/dev/null
selfserv with PID 16890 found at Tue Nov 27 17:34:36 PST 2012
selfserv with PID 16890 started at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16890 at Tue Nov 27 17:34:36 PST 2012
kill -USR1 16890
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16890 killed at Tue Nov 27 17:34:36 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16938 >/dev/null 2>/dev/null
selfserv with PID 16938 found at Tue Nov 27 17:34:36 PST 2012
selfserv with PID 16938 started at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16938 at Tue Nov 27 17:34:36 PST 2012
kill -USR1 16938
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16938 killed at Tue Nov 27 17:34:36 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:34:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 16986 >/dev/null 2>/dev/null
selfserv with PID 16986 found at Tue Nov 27 17:34:37 PST 2012
selfserv with PID 16986 started at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16986 at Tue Nov 27 17:34:37 PST 2012
kill -USR1 16986
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 16986 killed at Tue Nov 27 17:34:37 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:34:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17034 >/dev/null 2>/dev/null
selfserv with PID 17034 found at Tue Nov 27 17:34:37 PST 2012
selfserv with PID 17034 started at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17034 at Tue Nov 27 17:34:37 PST 2012
kill -USR1 17034
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17034 killed at Tue Nov 27 17:34:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17082 >/dev/null 2>/dev/null
selfserv with PID 17082 found at Tue Nov 27 17:34:37 PST 2012
selfserv with PID 17082 started at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1833: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17082 at Tue Nov 27 17:34:37 PST 2012
kill -USR1 17082
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17082 killed at Tue Nov 27 17:34:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:34:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17130 >/dev/null 2>/dev/null
selfserv with PID 17130 found at Tue Nov 27 17:34:37 PST 2012
selfserv with PID 17130 started at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1834: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17130 at Tue Nov 27 17:34:37 PST 2012
kill -USR1 17130
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17130 killed at Tue Nov 27 17:34:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:34:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17178 >/dev/null 2>/dev/null
selfserv with PID 17178 found at Tue Nov 27 17:34:37 PST 2012
selfserv with PID 17178 started at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17178 at Tue Nov 27 17:34:38 PST 2012
kill -USR1 17178
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17178 killed at Tue Nov 27 17:34:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17226 >/dev/null 2>/dev/null
selfserv with PID 17226 found at Tue Nov 27 17:34:38 PST 2012
selfserv with PID 17226 started at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17226 at Tue Nov 27 17:34:38 PST 2012
kill -USR1 17226
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17226 killed at Tue Nov 27 17:34:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:34:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17274 >/dev/null 2>/dev/null
selfserv with PID 17274 found at Tue Nov 27 17:34:38 PST 2012
selfserv with PID 17274 started at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17274 at Tue Nov 27 17:34:38 PST 2012
kill -USR1 17274
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17274 killed at Tue Nov 27 17:34:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:34:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17322 >/dev/null 2>/dev/null
selfserv with PID 17322 found at Tue Nov 27 17:34:38 PST 2012
selfserv with PID 17322 started at Tue Nov 27 17:34:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17322 at Tue Nov 27 17:34:38 PST 2012
kill -USR1 17322
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17322 killed at Tue Nov 27 17:34:38 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17370 >/dev/null 2>/dev/null
selfserv with PID 17370 found at Tue Nov 27 17:34:39 PST 2012
selfserv with PID 17370 started at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1839: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17370 at Tue Nov 27 17:34:39 PST 2012
kill -USR1 17370
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17370 killed at Tue Nov 27 17:34:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:34:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17418 >/dev/null 2>/dev/null
selfserv with PID 17418 found at Tue Nov 27 17:34:39 PST 2012
selfserv with PID 17418 started at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1840: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17418 at Tue Nov 27 17:34:39 PST 2012
kill -USR1 17418
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17418 killed at Tue Nov 27 17:34:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:34:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17466 >/dev/null 2>/dev/null
selfserv with PID 17466 found at Tue Nov 27 17:34:39 PST 2012
selfserv with PID 17466 started at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17466 at Tue Nov 27 17:34:39 PST 2012
kill -USR1 17466
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17466 killed at Tue Nov 27 17:34:39 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17514 >/dev/null 2>/dev/null
selfserv with PID 17514 found at Tue Nov 27 17:34:39 PST 2012
selfserv with PID 17514 started at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17514 at Tue Nov 27 17:34:39 PST 2012
kill -USR1 17514
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17514 killed at Tue Nov 27 17:34:39 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:34:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17562 >/dev/null 2>/dev/null
selfserv with PID 17562 found at Tue Nov 27 17:34:40 PST 2012
selfserv with PID 17562 started at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17562 at Tue Nov 27 17:34:40 PST 2012
kill -USR1 17562
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17562 killed at Tue Nov 27 17:34:40 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:34:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17610 >/dev/null 2>/dev/null
selfserv with PID 17610 found at Tue Nov 27 17:34:40 PST 2012
selfserv with PID 17610 started at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17610 at Tue Nov 27 17:34:40 PST 2012
kill -USR1 17610
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17610 killed at Tue Nov 27 17:34:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:34:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17658 >/dev/null 2>/dev/null
selfserv with PID 17658 found at Tue Nov 27 17:34:40 PST 2012
selfserv with PID 17658 started at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1845: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17658 at Tue Nov 27 17:34:40 PST 2012
kill -USR1 17658
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17658 killed at Tue Nov 27 17:34:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:34:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17706 >/dev/null 2>/dev/null
selfserv with PID 17706 found at Tue Nov 27 17:34:40 PST 2012
selfserv with PID 17706 started at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1846: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17706 at Tue Nov 27 17:34:40 PST 2012
kill -USR1 17706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17706 killed at Tue Nov 27 17:34:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:34:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17754 >/dev/null 2>/dev/null
selfserv with PID 17754 found at Tue Nov 27 17:34:41 PST 2012
selfserv with PID 17754 started at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17754 at Tue Nov 27 17:34:41 PST 2012
kill -USR1 17754
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17754 killed at Tue Nov 27 17:34:41 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17817 >/dev/null 2>/dev/null
selfserv with PID 17817 found at Tue Nov 27 17:34:41 PST 2012
selfserv with PID 17817 started at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17817 at Tue Nov 27 17:34:41 PST 2012
kill -USR1 17817
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17817 killed at Tue Nov 27 17:34:41 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17865 >/dev/null 2>/dev/null
selfserv with PID 17865 found at Tue Nov 27 17:34:41 PST 2012
selfserv with PID 17865 started at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17865 at Tue Nov 27 17:34:41 PST 2012
kill -USR1 17865
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17865 killed at Tue Nov 27 17:34:41 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17913 >/dev/null 2>/dev/null
selfserv with PID 17913 found at Tue Nov 27 17:34:41 PST 2012
selfserv with PID 17913 started at Tue Nov 27 17:34:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1850: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17913 at Tue Nov 27 17:34:41 PST 2012
kill -USR1 17913
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17913 killed at Tue Nov 27 17:34:42 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17961 >/dev/null 2>/dev/null
selfserv with PID 17961 found at Tue Nov 27 17:34:42 PST 2012
selfserv with PID 17961 started at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1851: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17961 at Tue Nov 27 17:34:42 PST 2012
kill -USR1 17961
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17961 killed at Tue Nov 27 17:34:42 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18009 >/dev/null 2>/dev/null
selfserv with PID 18009 found at Tue Nov 27 17:34:42 PST 2012
selfserv with PID 18009 started at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1852: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18009 at Tue Nov 27 17:34:42 PST 2012
kill -USR1 18009
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18009 killed at Tue Nov 27 17:34:42 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18057 >/dev/null 2>/dev/null
selfserv with PID 18057 found at Tue Nov 27 17:34:42 PST 2012
selfserv with PID 18057 started at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18057 at Tue Nov 27 17:34:42 PST 2012
kill -USR1 18057
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18057 killed at Tue Nov 27 17:34:42 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18105 >/dev/null 2>/dev/null
selfserv with PID 18105 found at Tue Nov 27 17:34:42 PST 2012
selfserv with PID 18105 started at Tue Nov 27 17:34:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1854: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18105 at Tue Nov 27 17:34:43 PST 2012
kill -USR1 18105
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18105 killed at Tue Nov 27 17:34:43 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18153 >/dev/null 2>/dev/null
selfserv with PID 18153 found at Tue Nov 27 17:34:43 PST 2012
selfserv with PID 18153 started at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18153 at Tue Nov 27 17:34:43 PST 2012
kill -USR1 18153
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18153 killed at Tue Nov 27 17:34:43 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18201 >/dev/null 2>/dev/null
selfserv with PID 18201 found at Tue Nov 27 17:34:43 PST 2012
selfserv with PID 18201 started at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18201 at Tue Nov 27 17:34:43 PST 2012
kill -USR1 18201
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18201 killed at Tue Nov 27 17:34:43 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18249 >/dev/null 2>/dev/null
selfserv with PID 18249 found at Tue Nov 27 17:34:43 PST 2012
selfserv with PID 18249 started at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1857: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18249 at Tue Nov 27 17:34:43 PST 2012
kill -USR1 18249
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18249 killed at Tue Nov 27 17:34:43 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18297 >/dev/null 2>/dev/null
selfserv with PID 18297 found at Tue Nov 27 17:34:43 PST 2012
selfserv with PID 18297 started at Tue Nov 27 17:34:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1858: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18297 at Tue Nov 27 17:34:44 PST 2012
kill -USR1 18297
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18297 killed at Tue Nov 27 17:34:44 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18345 >/dev/null 2>/dev/null
selfserv with PID 18345 found at Tue Nov 27 17:34:44 PST 2012
selfserv with PID 18345 started at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18345 at Tue Nov 27 17:34:44 PST 2012
kill -USR1 18345
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18345 killed at Tue Nov 27 17:34:44 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18393 >/dev/null 2>/dev/null
selfserv with PID 18393 found at Tue Nov 27 17:34:44 PST 2012
selfserv with PID 18393 started at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18393 at Tue Nov 27 17:34:44 PST 2012
kill -USR1 18393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18393 killed at Tue Nov 27 17:34:44 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18441 >/dev/null 2>/dev/null
selfserv with PID 18441 found at Tue Nov 27 17:34:44 PST 2012
selfserv with PID 18441 started at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18441 at Tue Nov 27 17:34:44 PST 2012
kill -USR1 18441
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18441 killed at Tue Nov 27 17:34:44 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18489 >/dev/null 2>/dev/null
selfserv with PID 18489 found at Tue Nov 27 17:34:45 PST 2012
selfserv with PID 18489 started at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1862: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18489 at Tue Nov 27 17:34:45 PST 2012
kill -USR1 18489
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18489 killed at Tue Nov 27 17:34:45 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18537 >/dev/null 2>/dev/null
selfserv with PID 18537 found at Tue Nov 27 17:34:45 PST 2012
selfserv with PID 18537 started at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18537 at Tue Nov 27 17:34:45 PST 2012
kill -USR1 18537
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18537 killed at Tue Nov 27 17:34:45 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18585 >/dev/null 2>/dev/null
selfserv with PID 18585 found at Tue Nov 27 17:34:45 PST 2012
selfserv with PID 18585 started at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18585 at Tue Nov 27 17:34:45 PST 2012
kill -USR1 18585
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18585 killed at Tue Nov 27 17:34:45 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18633 >/dev/null 2>/dev/null
selfserv with PID 18633 found at Tue Nov 27 17:34:45 PST 2012
selfserv with PID 18633 started at Tue Nov 27 17:34:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18633 at Tue Nov 27 17:34:45 PST 2012
kill -USR1 18633
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18633 killed at Tue Nov 27 17:34:45 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:34:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18691 >/dev/null 2>/dev/null
selfserv with PID 18691 found at Tue Nov 27 17:34:46 PST 2012
selfserv with PID 18691 started at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1866: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18691 at Tue Nov 27 17:34:46 PST 2012
kill -USR1 18691
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18691 killed at Tue Nov 27 17:34:46 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:34:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18739 >/dev/null 2>/dev/null
selfserv with PID 18739 found at Tue Nov 27 17:34:46 PST 2012
selfserv with PID 18739 started at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18739 at Tue Nov 27 17:34:46 PST 2012
kill -USR1 18739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18739 killed at Tue Nov 27 17:34:46 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:34:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18808 >/dev/null 2>/dev/null
selfserv with PID 18808 found at Tue Nov 27 17:34:46 PST 2012
selfserv with PID 18808 started at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18808 at Tue Nov 27 17:34:46 PST 2012
kill -USR1 18808
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18808 killed at Tue Nov 27 17:34:46 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:34:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18862 >/dev/null 2>/dev/null
selfserv with PID 18862 found at Tue Nov 27 17:34:46 PST 2012
selfserv with PID 18862 started at Tue Nov 27 17:34:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1869: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18862 at Tue Nov 27 17:34:47 PST 2012
kill -USR1 18862
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18862 killed at Tue Nov 27 17:34:47 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:34:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18916 >/dev/null 2>/dev/null
selfserv with PID 18916 found at Tue Nov 27 17:34:47 PST 2012
selfserv with PID 18916 started at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1870: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18916 at Tue Nov 27 17:34:47 PST 2012
kill -USR1 18916
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18916 killed at Tue Nov 27 17:34:47 PST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:34:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18970 >/dev/null 2>/dev/null
selfserv with PID 18970 found at Tue Nov 27 17:34:47 PST 2012
selfserv with PID 18970 started at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18970 at Tue Nov 27 17:34:47 PST 2012
kill -USR1 18970
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18970 killed at Tue Nov 27 17:34:47 PST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 17:34:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19024 >/dev/null 2>/dev/null
selfserv with PID 19024 found at Tue Nov 27 17:34:47 PST 2012
selfserv with PID 19024 started at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1872: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19024 at Tue Nov 27 17:34:47 PST 2012
kill -USR1 19024
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19024 killed at Tue Nov 27 17:34:47 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:34:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19078 >/dev/null 2>/dev/null
selfserv with PID 19078 found at Tue Nov 27 17:34:47 PST 2012
selfserv with PID 19078 started at Tue Nov 27 17:34:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19078 at Tue Nov 27 17:34:48 PST 2012
kill -USR1 19078
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19078 killed at Tue Nov 27 17:34:48 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:34:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19132 >/dev/null 2>/dev/null
selfserv with PID 19132 found at Tue Nov 27 17:34:48 PST 2012
selfserv with PID 19132 started at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1874: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19132 at Tue Nov 27 17:34:48 PST 2012
kill -USR1 19132
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19132 killed at Tue Nov 27 17:34:48 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 17:34:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19186 >/dev/null 2>/dev/null
selfserv with PID 19186 found at Tue Nov 27 17:34:48 PST 2012
selfserv with PID 19186 started at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #1875: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19186 at Tue Nov 27 17:34:48 PST 2012
kill -USR1 19186
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19186 killed at Tue Nov 27 17:34:48 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 17:34:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19240 >/dev/null 2>/dev/null
selfserv with PID 19240 found at Tue Nov 27 17:34:48 PST 2012
selfserv with PID 19240 started at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1876: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19240 at Tue Nov 27 17:34:48 PST 2012
kill -USR1 19240
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19240 killed at Tue Nov 27 17:34:48 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:34:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19294 >/dev/null 2>/dev/null
selfserv with PID 19294 found at Tue Nov 27 17:34:48 PST 2012
selfserv with PID 19294 started at Tue Nov 27 17:34:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1877: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19294 at Tue Nov 27 17:34:49 PST 2012
kill -USR1 19294
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19294 killed at Tue Nov 27 17:34:49 PST 2012
ssl.sh: SSL Stress Test  - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:34:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19417 >/dev/null 2>/dev/null
selfserv with PID 19417 found at Tue Nov 27 17:34:49 PST 2012
selfserv with PID 19417 started at Tue Nov 27 17:34:49 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C A \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 17:34:50 PST 2012
ssl.sh: #1878: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19417 at Tue Nov 27 17:34:50 PST 2012
kill -USR1 19417
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19417 killed at Tue Nov 27 17:34:50 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:34:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19475 >/dev/null 2>/dev/null
selfserv with PID 19475 found at Tue Nov 27 17:34:50 PST 2012
selfserv with PID 19475 started at Tue Nov 27 17:34:50 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:34:51 PST 2012
ssl.sh: #1879: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19475 at Tue Nov 27 17:34:51 PST 2012
kill -USR1 19475
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19475 killed at Tue Nov 27 17:34:51 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:34:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19533 >/dev/null 2>/dev/null
selfserv with PID 19533 found at Tue Nov 27 17:34:51 PST 2012
selfserv with PID 19533 started at Tue Nov 27 17:34:51 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:34:52 PST 2012
ssl.sh: #1880: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19533 at Tue Nov 27 17:34:52 PST 2012
kill -USR1 19533
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19533 killed at Tue Nov 27 17:34:52 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:34:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19591 >/dev/null 2>/dev/null
selfserv with PID 19591 found at Tue Nov 27 17:34:52 PST 2012
selfserv with PID 19591 started at Tue Nov 27 17:34:52 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:34:53 PST 2012
ssl.sh: #1881: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19591 at Tue Nov 27 17:34:53 PST 2012
kill -USR1 19591
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19591 killed at Tue Nov 27 17:34:53 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:34:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19649 >/dev/null 2>/dev/null
selfserv with PID 19649 found at Tue Nov 27 17:34:53 PST 2012
selfserv with PID 19649 started at Tue Nov 27 17:34:53 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:53 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:34:54 PST 2012
ssl.sh: #1882: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19649 at Tue Nov 27 17:34:54 PST 2012
kill -USR1 19649
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19649 killed at Tue Nov 27 17:34:54 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:34:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19707 >/dev/null 2>/dev/null
selfserv with PID 19707 found at Tue Nov 27 17:34:54 PST 2012
selfserv with PID 19707 started at Tue Nov 27 17:34:54 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:34:56 PST 2012
ssl.sh: #1883: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19707 at Tue Nov 27 17:34:56 PST 2012
kill -USR1 19707
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19707 killed at Tue Nov 27 17:34:56 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:34:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19765 >/dev/null 2>/dev/null
selfserv with PID 19765 found at Tue Nov 27 17:34:56 PST 2012
selfserv with PID 19765 started at Tue Nov 27 17:34:56 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:34:57 PST 2012
ssl.sh: #1884: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19765 at Tue Nov 27 17:34:57 PST 2012
kill -USR1 19765
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19765 killed at Tue Nov 27 17:34:57 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:34:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19823 >/dev/null 2>/dev/null
selfserv with PID 19823 found at Tue Nov 27 17:34:57 PST 2012
selfserv with PID 19823 started at Tue Nov 27 17:34:57 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:57 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:34:58 PST 2012
ssl.sh: #1885: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19823 at Tue Nov 27 17:34:58 PST 2012
kill -USR1 19823
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19823 killed at Tue Nov 27 17:34:58 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 17:34:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:34:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19887 >/dev/null 2>/dev/null
selfserv with PID 19887 found at Tue Nov 27 17:34:59 PST 2012
selfserv with PID 19887 started at Tue Nov 27 17:34:59 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:34:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:00 PST 2012
ssl.sh: #1886: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19887 at Tue Nov 27 17:35:00 PST 2012
kill -USR1 19887
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19887 killed at Tue Nov 27 17:35:00 PST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 19966 >/dev/null 2>/dev/null
selfserv with PID 19966 found at Tue Nov 27 17:35:00 PST 2012
selfserv with PID 19966 started at Tue Nov 27 17:35:00 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C A -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:00 PST 2012
ssl.sh: #1887: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19966 at Tue Nov 27 17:35:00 PST 2012
kill -USR1 19966
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 19966 killed at Tue Nov 27 17:35:00 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20024 >/dev/null 2>/dev/null
selfserv with PID 20024 found at Tue Nov 27 17:35:00 PST 2012
selfserv with PID 20024 started at Tue Nov 27 17:35:00 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:01 PST 2012
ssl.sh: #1888: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20024 at Tue Nov 27 17:35:01 PST 2012
kill -USR1 20024
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20024 killed at Tue Nov 27 17:35:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 17:35:01 PST 2012
selfserv with PID 20082 started at Tue Nov 27 17:35:01 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:02 PST 2012
ssl.sh: #1889: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20082 at Tue Nov 27 17:35:02 PST 2012
kill -USR1 20082
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20082 killed at Tue Nov 27 17:35:02 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:35:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20140 >/dev/null 2>/dev/null
selfserv with PID 20140 found at Tue Nov 27 17:35:02 PST 2012
selfserv with PID 20140 started at Tue Nov 27 17:35:02 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:35:02 PST 2012
ssl.sh: #1890: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20140 at Tue Nov 27 17:35:02 PST 2012
kill -USR1 20140
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20140 killed at Tue Nov 27 17:35:02 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:35:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20198 >/dev/null 2>/dev/null
selfserv with PID 20198 found at Tue Nov 27 17:35:02 PST 2012
selfserv with PID 20198 started at Tue Nov 27 17:35:02 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:03 PST 2012
ssl.sh: #1891: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20198 at Tue Nov 27 17:35:03 PST 2012
kill -USR1 20198
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20198 killed at Tue Nov 27 17:35:03 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:35:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20256 >/dev/null 2>/dev/null
selfserv with PID 20256 found at Tue Nov 27 17:35:03 PST 2012
selfserv with PID 20256 started at Tue Nov 27 17:35:03 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:03 PST 2012
ssl.sh: #1892: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20256 at Tue Nov 27 17:35:03 PST 2012
kill -USR1 20256
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20256 killed at Tue Nov 27 17:35:03 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:35:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20314 >/dev/null 2>/dev/null
selfserv with PID 20314 found at Tue Nov 27 17:35:03 PST 2012
selfserv with PID 20314 started at Tue Nov 27 17:35:03 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:35:03 PST 2012
ssl.sh: #1893: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20314 at Tue Nov 27 17:35:03 PST 2012
kill -USR1 20314
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20314 killed at Tue Nov 27 17:35:03 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:35:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20372 >/dev/null 2>/dev/null
selfserv with PID 20372 found at Tue Nov 27 17:35:03 PST 2012
selfserv with PID 20372 started at Tue Nov 27 17:35:03 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:35:04 PST 2012
ssl.sh: #1894: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20372 at Tue Nov 27 17:35:04 PST 2012
kill -USR1 20372
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20372 killed at Tue Nov 27 17:35:04 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 17:35:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20436 >/dev/null 2>/dev/null
selfserv with PID 20436 found at Tue Nov 27 17:35:04 PST 2012
selfserv with PID 20436 started at Tue Nov 27 17:35:04 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:04 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:06 PST 2012
ssl.sh: #1895: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20436 at Tue Nov 27 17:35:06 PST 2012
kill -USR1 20436
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20436 killed at Tue Nov 27 17:35:06 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 17:35:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20500 >/dev/null 2>/dev/null
selfserv with PID 20500 found at Tue Nov 27 17:35:06 PST 2012
selfserv with PID 20500 started at Tue Nov 27 17:35:06 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:08 PST 2012
ssl.sh: #1896: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20500 at Tue Nov 27 17:35:08 PST 2012
kill -USR1 20500
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20500 killed at Tue Nov 27 17:35:08 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:35:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20579 >/dev/null 2>/dev/null
selfserv with PID 20579 found at Tue Nov 27 17:35:08 PST 2012
selfserv with PID 20579 started at Tue Nov 27 17:35:08 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:08 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:11 PST 2012
ssl.sh: #1897: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20579 at Tue Nov 27 17:35:11 PST 2012
kill -USR1 20579
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20579 killed at Tue Nov 27 17:35:11 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:35:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 17:35:11 PST 2012
selfserv with PID 20637 started at Tue Nov 27 17:35:11 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:11 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:12 PST 2012
ssl.sh: #1898: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20637 at Tue Nov 27 17:35:12 PST 2012
kill -USR1 20637
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20637 killed at Tue Nov 27 17:35:12 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:35:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20695 >/dev/null 2>/dev/null
selfserv with PID 20695 found at Tue Nov 27 17:35:12 PST 2012
selfserv with PID 20695 started at Tue Nov 27 17:35:12 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:14 PST 2012
ssl.sh: #1899: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20695 at Tue Nov 27 17:35:14 PST 2012
kill -USR1 20695
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20695 killed at Tue Nov 27 17:35:14 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:35:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20753 >/dev/null 2>/dev/null
selfserv with PID 20753 found at Tue Nov 27 17:35:14 PST 2012
selfserv with PID 20753 started at Tue Nov 27 17:35:14 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:16 PST 2012
ssl.sh: #1900: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20753 at Tue Nov 27 17:35:16 PST 2012
kill -USR1 20753
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20753 killed at Tue Nov 27 17:35:16 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:35:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20811 >/dev/null 2>/dev/null
selfserv with PID 20811 found at Tue Nov 27 17:35:16 PST 2012
selfserv with PID 20811 started at Tue Nov 27 17:35:16 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:17 PST 2012
ssl.sh: #1901: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20811 at Tue Nov 27 17:35:17 PST 2012
kill -USR1 20811
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20811 killed at Tue Nov 27 17:35:17 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:35:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20869 >/dev/null 2>/dev/null
selfserv with PID 20869 found at Tue Nov 27 17:35:17 PST 2012
selfserv with PID 20869 started at Tue Nov 27 17:35:17 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:18 PST 2012
ssl.sh: #1902: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20869 at Tue Nov 27 17:35:18 PST 2012
kill -USR1 20869
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20869 killed at Tue Nov 27 17:35:18 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20950 >/dev/null 2>/dev/null
selfserv with PID 20950 found at Tue Nov 27 17:35:18 PST 2012
selfserv with PID 20950 started at Tue Nov 27 17:35:19 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:19 PST 2012
ssl.sh: #1903: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20950 at Tue Nov 27 17:35:19 PST 2012
kill -USR1 20950
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20950 killed at Tue Nov 27 17:35:19 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:35:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21008 >/dev/null 2>/dev/null
selfserv with PID 21008 found at Tue Nov 27 17:35:19 PST 2012
selfserv with PID 21008 started at Tue Nov 27 17:35:19 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:19 PST 2012
ssl.sh: #1904: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21008 at Tue Nov 27 17:35:20 PST 2012
kill -USR1 21008
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21008 killed at Tue Nov 27 17:35:20 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21066 >/dev/null 2>/dev/null
selfserv with PID 21066 found at Tue Nov 27 17:35:20 PST 2012
selfserv with PID 21066 started at Tue Nov 27 17:35:20 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:20 PST 2012
ssl.sh: #1905: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21066 at Tue Nov 27 17:35:20 PST 2012
kill -USR1 21066
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21066 killed at Tue Nov 27 17:35:20 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21124 >/dev/null 2>/dev/null
selfserv with PID 21124 found at Tue Nov 27 17:35:20 PST 2012
selfserv with PID 21124 started at Tue Nov 27 17:35:20 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:35:21 PST 2012
ssl.sh: #1906: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21124 at Tue Nov 27 17:35:21 PST 2012
kill -USR1 21124
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21124 killed at Tue Nov 27 17:35:21 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:35:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21182 >/dev/null 2>/dev/null
selfserv with PID 21182 found at Tue Nov 27 17:35:21 PST 2012
selfserv with PID 21182 started at Tue Nov 27 17:35:21 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:21 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:21 PST 2012
ssl.sh: #1907: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21182 at Tue Nov 27 17:35:21 PST 2012
kill -USR1 21182
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21182 killed at Tue Nov 27 17:35:21 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:35:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21240 >/dev/null 2>/dev/null
selfserv with PID 21240 found at Tue Nov 27 17:35:21 PST 2012
selfserv with PID 21240 started at Tue Nov 27 17:35:21 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:21 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:35:22 PST 2012
ssl.sh: #1908: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21240 at Tue Nov 27 17:35:22 PST 2012
kill -USR1 21240
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21240 killed at Tue Nov 27 17:35:22 PST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 17:35:22 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:22 PST 2012
selfserv with PID 21285 started at Tue Nov 27 17:35:22 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1909: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1910: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1911: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1912: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1913: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1914: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1915: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1916: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1917: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1918: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1919: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1920: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1923: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1924: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1925: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1926: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1927: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1928: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1929: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1930: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1931: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1932: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1933: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1934: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1935: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1936: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1937: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1938: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1939: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1940: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1941: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1942: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1943: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1944: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1945: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1946: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1947: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1948: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1949: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1950: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1951: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1952: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1953: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1954: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1955: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1956: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1957: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1958: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21285 at Tue Nov 27 17:35:29 PST 2012
kill -USR1 21285
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21285 killed at Tue Nov 27 17:35:29 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:35:29 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 22699 >/dev/null 2>/dev/null
selfserv with PID 22699 found at Tue Nov 27 17:35:29 PST 2012
selfserv with PID 22699 started at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1959: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22699 >/dev/null 2>/dev/null
selfserv with PID 22699 found at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1960: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22699 >/dev/null 2>/dev/null
selfserv with PID 22699 found at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1961: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22699 >/dev/null 2>/dev/null
selfserv with PID 22699 found at Tue Nov 27 17:35:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1962: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22699 >/dev/null 2>/dev/null
selfserv with PID 22699 found at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1963: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22699 at Tue Nov 27 17:35:30 PST 2012
kill -USR1 22699
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 22699 killed at Tue Nov 27 17:35:30 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:35:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:30 PST 2012
selfserv with PID 22838 started at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1964: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1965: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1966: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1967: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1968: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1969: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1970: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1971: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Tue Nov 27 17:35:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22838 at Tue Nov 27 17:35:32 PST 2012
kill -USR1 22838
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 22838 killed at Tue Nov 27 17:35:32 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:35:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23228 >/dev/null 2>/dev/null
selfserv with PID 23228 found at Tue Nov 27 17:35:32 PST 2012
selfserv with PID 23228 started at Tue Nov 27 17:35:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23228 >/dev/null 2>/dev/null
selfserv with PID 23228 found at Tue Nov 27 17:35:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23228 >/dev/null 2>/dev/null
selfserv with PID 23228 found at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23228 >/dev/null 2>/dev/null
selfserv with PID 23228 found at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23228 >/dev/null 2>/dev/null
selfserv with PID 23228 found at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23228 at Tue Nov 27 17:35:33 PST 2012
kill -USR1 23228
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23228 killed at Tue Nov 27 17:35:33 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:35:33 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:33 PST 2012
selfserv with PID 23367 started at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 17:35:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23367 at Tue Nov 27 17:35:36 PST 2012
kill -USR1 23367
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23367 killed at Tue Nov 27 17:35:36 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:35:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23744 >/dev/null 2>/dev/null
selfserv with PID 23744 found at Tue Nov 27 17:35:36 PST 2012
selfserv with PID 23744 started at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23744 >/dev/null 2>/dev/null
selfserv with PID 23744 found at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23744 >/dev/null 2>/dev/null
selfserv with PID 23744 found at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23744 >/dev/null 2>/dev/null
selfserv with PID 23744 found at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23744 >/dev/null 2>/dev/null
selfserv with PID 23744 found at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23744 at Tue Nov 27 17:35:36 PST 2012
kill -USR1 23744
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23744 killed at Tue Nov 27 17:35:36 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:35:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23883 >/dev/null 2>/dev/null
selfserv with PID 23883 found at Tue Nov 27 17:35:37 PST 2012
selfserv with PID 23883 started at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23883 >/dev/null 2>/dev/null
selfserv with PID 23883 found at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23883 >/dev/null 2>/dev/null
selfserv with PID 23883 found at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23883 >/dev/null 2>/dev/null
selfserv with PID 23883 found at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23883 >/dev/null 2>/dev/null
selfserv with PID 23883 found at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23883 at Tue Nov 27 17:35:37 PST 2012
kill -USR1 23883
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23883 killed at Tue Nov 27 17:35:37 PST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:37 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24073 >/dev/null 2>/dev/null
selfserv with PID 24073 found at Tue Nov 27 17:35:37 PST 2012
selfserv with PID 24073 started at Tue Nov 27 17:35:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24073 at Tue Nov 27 17:35:38 PST 2012
kill -USR1 24073
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24073 killed at Tue Nov 27 17:35:38 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:35:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24121 >/dev/null 2>/dev/null
selfserv with PID 24121 found at Tue Nov 27 17:35:38 PST 2012
selfserv with PID 24121 started at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24121 at Tue Nov 27 17:35:38 PST 2012
kill -USR1 24121
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24121 killed at Tue Nov 27 17:35:38 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:35:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24169 >/dev/null 2>/dev/null
selfserv with PID 24169 found at Tue Nov 27 17:35:38 PST 2012
selfserv with PID 24169 started at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24169 at Tue Nov 27 17:35:38 PST 2012
kill -USR1 24169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24169 killed at Tue Nov 27 17:35:38 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24217 >/dev/null 2>/dev/null
selfserv with PID 24217 found at Tue Nov 27 17:35:38 PST 2012
selfserv with PID 24217 started at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2012: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24217 at Tue Nov 27 17:35:38 PST 2012
kill -USR1 24217
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24217 killed at Tue Nov 27 17:35:38 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:35:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24265 >/dev/null 2>/dev/null
selfserv with PID 24265 found at Tue Nov 27 17:35:38 PST 2012
selfserv with PID 24265 started at Tue Nov 27 17:35:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2013: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24265 at Tue Nov 27 17:35:39 PST 2012
kill -USR1 24265
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24265 killed at Tue Nov 27 17:35:39 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:35:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24313 >/dev/null 2>/dev/null
selfserv with PID 24313 found at Tue Nov 27 17:35:39 PST 2012
selfserv with PID 24313 started at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24313 at Tue Nov 27 17:35:39 PST 2012
kill -USR1 24313
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24313 killed at Tue Nov 27 17:35:39 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24361 >/dev/null 2>/dev/null
selfserv with PID 24361 found at Tue Nov 27 17:35:39 PST 2012
selfserv with PID 24361 started at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24361 at Tue Nov 27 17:35:39 PST 2012
kill -USR1 24361
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24361 killed at Tue Nov 27 17:35:39 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:35:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24409 >/dev/null 2>/dev/null
selfserv with PID 24409 found at Tue Nov 27 17:35:39 PST 2012
selfserv with PID 24409 started at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24409 at Tue Nov 27 17:35:39 PST 2012
kill -USR1 24409
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24409 killed at Tue Nov 27 17:35:39 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:35:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24457 >/dev/null 2>/dev/null
selfserv with PID 24457 found at Tue Nov 27 17:35:39 PST 2012
selfserv with PID 24457 started at Tue Nov 27 17:35:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24457 at Tue Nov 27 17:35:40 PST 2012
kill -USR1 24457
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24457 killed at Tue Nov 27 17:35:40 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24505 >/dev/null 2>/dev/null
selfserv with PID 24505 found at Tue Nov 27 17:35:40 PST 2012
selfserv with PID 24505 started at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2018: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24505 at Tue Nov 27 17:35:40 PST 2012
kill -USR1 24505
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24505 killed at Tue Nov 27 17:35:40 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:35:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24553 >/dev/null 2>/dev/null
selfserv with PID 24553 found at Tue Nov 27 17:35:40 PST 2012
selfserv with PID 24553 started at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2019: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24553 at Tue Nov 27 17:35:40 PST 2012
kill -USR1 24553
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24553 killed at Tue Nov 27 17:35:40 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:35:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24601 >/dev/null 2>/dev/null
selfserv with PID 24601 found at Tue Nov 27 17:35:40 PST 2012
selfserv with PID 24601 started at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24601 at Tue Nov 27 17:35:40 PST 2012
kill -USR1 24601
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24601 killed at Tue Nov 27 17:35:40 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24649 >/dev/null 2>/dev/null
selfserv with PID 24649 found at Tue Nov 27 17:35:40 PST 2012
selfserv with PID 24649 started at Tue Nov 27 17:35:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24649 at Tue Nov 27 17:35:41 PST 2012
kill -USR1 24649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24649 killed at Tue Nov 27 17:35:41 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:35:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24697 >/dev/null 2>/dev/null
selfserv with PID 24697 found at Tue Nov 27 17:35:41 PST 2012
selfserv with PID 24697 started at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24697 at Tue Nov 27 17:35:41 PST 2012
kill -USR1 24697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24697 killed at Tue Nov 27 17:35:41 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:35:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24745 >/dev/null 2>/dev/null
selfserv with PID 24745 found at Tue Nov 27 17:35:41 PST 2012
selfserv with PID 24745 started at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24745 at Tue Nov 27 17:35:41 PST 2012
kill -USR1 24745
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24745 killed at Tue Nov 27 17:35:41 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24793 >/dev/null 2>/dev/null
selfserv with PID 24793 found at Tue Nov 27 17:35:41 PST 2012
selfserv with PID 24793 started at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2024: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24793 at Tue Nov 27 17:35:41 PST 2012
kill -USR1 24793
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24793 killed at Tue Nov 27 17:35:41 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:35:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24841 >/dev/null 2>/dev/null
selfserv with PID 24841 found at Tue Nov 27 17:35:41 PST 2012
selfserv with PID 24841 started at Tue Nov 27 17:35:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2025: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24841 at Tue Nov 27 17:35:42 PST 2012
kill -USR1 24841
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24841 killed at Tue Nov 27 17:35:42 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:35:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24889 >/dev/null 2>/dev/null
selfserv with PID 24889 found at Tue Nov 27 17:35:42 PST 2012
selfserv with PID 24889 started at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24889 at Tue Nov 27 17:35:42 PST 2012
kill -USR1 24889
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24889 killed at Tue Nov 27 17:35:42 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24937 >/dev/null 2>/dev/null
selfserv with PID 24937 found at Tue Nov 27 17:35:42 PST 2012
selfserv with PID 24937 started at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24937 at Tue Nov 27 17:35:42 PST 2012
kill -USR1 24937
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24937 killed at Tue Nov 27 17:35:42 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:35:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24985 >/dev/null 2>/dev/null
selfserv with PID 24985 found at Tue Nov 27 17:35:42 PST 2012
selfserv with PID 24985 started at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24985 at Tue Nov 27 17:35:42 PST 2012
kill -USR1 24985
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24985 killed at Tue Nov 27 17:35:42 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:35:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25033 >/dev/null 2>/dev/null
selfserv with PID 25033 found at Tue Nov 27 17:35:42 PST 2012
selfserv with PID 25033 started at Tue Nov 27 17:35:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25033 at Tue Nov 27 17:35:43 PST 2012
kill -USR1 25033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25033 killed at Tue Nov 27 17:35:43 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25081 >/dev/null 2>/dev/null
selfserv with PID 25081 found at Tue Nov 27 17:35:43 PST 2012
selfserv with PID 25081 started at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2030: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25081 at Tue Nov 27 17:35:43 PST 2012
kill -USR1 25081
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25081 killed at Tue Nov 27 17:35:43 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:35:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25129 >/dev/null 2>/dev/null
selfserv with PID 25129 found at Tue Nov 27 17:35:43 PST 2012
selfserv with PID 25129 started at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2031: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25129 at Tue Nov 27 17:35:43 PST 2012
kill -USR1 25129
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25129 killed at Tue Nov 27 17:35:43 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:35:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25177 >/dev/null 2>/dev/null
selfserv with PID 25177 found at Tue Nov 27 17:35:43 PST 2012
selfserv with PID 25177 started at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25177 at Tue Nov 27 17:35:43 PST 2012
kill -USR1 25177
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25177 killed at Tue Nov 27 17:35:43 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25225 >/dev/null 2>/dev/null
selfserv with PID 25225 found at Tue Nov 27 17:35:43 PST 2012
selfserv with PID 25225 started at Tue Nov 27 17:35:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25225 at Tue Nov 27 17:35:44 PST 2012
kill -USR1 25225
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25225 killed at Tue Nov 27 17:35:44 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:35:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25273 >/dev/null 2>/dev/null
selfserv with PID 25273 found at Tue Nov 27 17:35:44 PST 2012
selfserv with PID 25273 started at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25273 at Tue Nov 27 17:35:44 PST 2012
kill -USR1 25273
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25273 killed at Tue Nov 27 17:35:44 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:35:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25321 >/dev/null 2>/dev/null
selfserv with PID 25321 found at Tue Nov 27 17:35:44 PST 2012
selfserv with PID 25321 started at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25321 at Tue Nov 27 17:35:44 PST 2012
kill -USR1 25321
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25321 killed at Tue Nov 27 17:35:44 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:35:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25369 >/dev/null 2>/dev/null
selfserv with PID 25369 found at Tue Nov 27 17:35:44 PST 2012
selfserv with PID 25369 started at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2036: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25369 at Tue Nov 27 17:35:44 PST 2012
kill -USR1 25369
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25369 killed at Tue Nov 27 17:35:44 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:35:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25417 >/dev/null 2>/dev/null
selfserv with PID 25417 found at Tue Nov 27 17:35:44 PST 2012
selfserv with PID 25417 started at Tue Nov 27 17:35:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2037: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25417 at Tue Nov 27 17:35:44 PST 2012
kill -USR1 25417
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25417 killed at Tue Nov 27 17:35:45 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:35:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25465 >/dev/null 2>/dev/null
selfserv with PID 25465 found at Tue Nov 27 17:35:45 PST 2012
selfserv with PID 25465 started at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25465 at Tue Nov 27 17:35:45 PST 2012
kill -USR1 25465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25465 killed at Tue Nov 27 17:35:45 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25528 >/dev/null 2>/dev/null
selfserv with PID 25528 found at Tue Nov 27 17:35:45 PST 2012
selfserv with PID 25528 started at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25528 at Tue Nov 27 17:35:45 PST 2012
kill -USR1 25528
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25528 killed at Tue Nov 27 17:35:45 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25576 >/dev/null 2>/dev/null
selfserv with PID 25576 found at Tue Nov 27 17:35:45 PST 2012
selfserv with PID 25576 started at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25576 at Tue Nov 27 17:35:45 PST 2012
kill -USR1 25576
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25576 killed at Tue Nov 27 17:35:45 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25624 >/dev/null 2>/dev/null
selfserv with PID 25624 found at Tue Nov 27 17:35:45 PST 2012
selfserv with PID 25624 started at Tue Nov 27 17:35:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2041: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25624 at Tue Nov 27 17:35:46 PST 2012
kill -USR1 25624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25624 killed at Tue Nov 27 17:35:46 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25682 >/dev/null 2>/dev/null
selfserv with PID 25682 found at Tue Nov 27 17:35:46 PST 2012
selfserv with PID 25682 started at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2042: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25682 at Tue Nov 27 17:35:46 PST 2012
kill -USR1 25682
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25682 killed at Tue Nov 27 17:35:46 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25730 >/dev/null 2>/dev/null
selfserv with PID 25730 found at Tue Nov 27 17:35:46 PST 2012
selfserv with PID 25730 started at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2043: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25730 at Tue Nov 27 17:35:46 PST 2012
kill -USR1 25730
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25730 killed at Tue Nov 27 17:35:46 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25778 >/dev/null 2>/dev/null
selfserv with PID 25778 found at Tue Nov 27 17:35:46 PST 2012
selfserv with PID 25778 started at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25778 at Tue Nov 27 17:35:46 PST 2012
kill -USR1 25778
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25778 killed at Tue Nov 27 17:35:46 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25826 >/dev/null 2>/dev/null
selfserv with PID 25826 found at Tue Nov 27 17:35:47 PST 2012
selfserv with PID 25826 started at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2045: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25826 at Tue Nov 27 17:35:47 PST 2012
kill -USR1 25826
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25826 killed at Tue Nov 27 17:35:47 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25874 >/dev/null 2>/dev/null
selfserv with PID 25874 found at Tue Nov 27 17:35:47 PST 2012
selfserv with PID 25874 started at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25874 at Tue Nov 27 17:35:47 PST 2012
kill -USR1 25874
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25874 killed at Tue Nov 27 17:35:47 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25922 >/dev/null 2>/dev/null
selfserv with PID 25922 found at Tue Nov 27 17:35:47 PST 2012
selfserv with PID 25922 started at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25922 at Tue Nov 27 17:35:47 PST 2012
kill -USR1 25922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25922 killed at Tue Nov 27 17:35:47 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25970 >/dev/null 2>/dev/null
selfserv with PID 25970 found at Tue Nov 27 17:35:47 PST 2012
selfserv with PID 25970 started at Tue Nov 27 17:35:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2048: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25970 at Tue Nov 27 17:35:47 PST 2012
kill -USR1 25970
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25970 killed at Tue Nov 27 17:35:48 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26018 >/dev/null 2>/dev/null
selfserv with PID 26018 found at Tue Nov 27 17:35:48 PST 2012
selfserv with PID 26018 started at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2049: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26018 at Tue Nov 27 17:35:48 PST 2012
kill -USR1 26018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26018 killed at Tue Nov 27 17:35:48 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26066 >/dev/null 2>/dev/null
selfserv with PID 26066 found at Tue Nov 27 17:35:48 PST 2012
selfserv with PID 26066 started at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26066 at Tue Nov 27 17:35:48 PST 2012
kill -USR1 26066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26066 killed at Tue Nov 27 17:35:48 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26114 >/dev/null 2>/dev/null
selfserv with PID 26114 found at Tue Nov 27 17:35:48 PST 2012
selfserv with PID 26114 started at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26114 at Tue Nov 27 17:35:48 PST 2012
kill -USR1 26114
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26114 killed at Tue Nov 27 17:35:48 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26162 >/dev/null 2>/dev/null
selfserv with PID 26162 found at Tue Nov 27 17:35:48 PST 2012
selfserv with PID 26162 started at Tue Nov 27 17:35:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26162 at Tue Nov 27 17:35:49 PST 2012
kill -USR1 26162
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26162 killed at Tue Nov 27 17:35:49 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26210 >/dev/null 2>/dev/null
selfserv with PID 26210 found at Tue Nov 27 17:35:49 PST 2012
selfserv with PID 26210 started at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2053: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26210 at Tue Nov 27 17:35:49 PST 2012
kill -USR1 26210
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26210 killed at Tue Nov 27 17:35:49 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26258 >/dev/null 2>/dev/null
selfserv with PID 26258 found at Tue Nov 27 17:35:49 PST 2012
selfserv with PID 26258 started at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26258 at Tue Nov 27 17:35:49 PST 2012
kill -USR1 26258
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26258 killed at Tue Nov 27 17:35:49 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26306 >/dev/null 2>/dev/null
selfserv with PID 26306 found at Tue Nov 27 17:35:49 PST 2012
selfserv with PID 26306 started at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26306 at Tue Nov 27 17:35:49 PST 2012
kill -USR1 26306
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26306 killed at Tue Nov 27 17:35:49 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26354 >/dev/null 2>/dev/null
selfserv with PID 26354 found at Tue Nov 27 17:35:49 PST 2012
selfserv with PID 26354 started at Tue Nov 27 17:35:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26354 at Tue Nov 27 17:35:50 PST 2012
kill -USR1 26354
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26354 killed at Tue Nov 27 17:35:50 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:35:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26402 >/dev/null 2>/dev/null
selfserv with PID 26402 found at Tue Nov 27 17:35:50 PST 2012
selfserv with PID 26402 started at Tue Nov 27 17:35:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2057: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26402 at Tue Nov 27 17:35:50 PST 2012
kill -USR1 26402
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26402 killed at Tue Nov 27 17:35:50 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:35:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26450 >/dev/null 2>/dev/null
selfserv with PID 26450 found at Tue Nov 27 17:35:50 PST 2012
selfserv with PID 26450 started at Tue Nov 27 17:35:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26450 at Tue Nov 27 17:35:50 PST 2012
kill -USR1 26450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26450 killed at Tue Nov 27 17:35:50 PST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:35:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26612 >/dev/null 2>/dev/null
selfserv with PID 26612 found at Tue Nov 27 17:35:50 PST 2012
selfserv with PID 26612 started at Tue Nov 27 17:35:51 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:51 PST 2012
ssl.sh: #2059: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26612 at Tue Nov 27 17:35:51 PST 2012
kill -USR1 26612
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26612 killed at Tue Nov 27 17:35:51 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:35:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26670 >/dev/null 2>/dev/null
selfserv with PID 26670 found at Tue Nov 27 17:35:52 PST 2012
selfserv with PID 26670 started at Tue Nov 27 17:35:52 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:53 PST 2012
ssl.sh: #2060: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26670 at Tue Nov 27 17:35:53 PST 2012
kill -USR1 26670
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26670 killed at Tue Nov 27 17:35:53 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:35:53 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26728 >/dev/null 2>/dev/null
selfserv with PID 26728 found at Tue Nov 27 17:35:53 PST 2012
selfserv with PID 26728 started at Tue Nov 27 17:35:53 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:53 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:54 PST 2012
ssl.sh: #2061: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26728 at Tue Nov 27 17:35:54 PST 2012
kill -USR1 26728
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26728 killed at Tue Nov 27 17:35:54 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:35:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26786 >/dev/null 2>/dev/null
selfserv with PID 26786 found at Tue Nov 27 17:35:54 PST 2012
selfserv with PID 26786 started at Tue Nov 27 17:35:54 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:55 PST 2012
ssl.sh: #2062: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26786 at Tue Nov 27 17:35:55 PST 2012
kill -USR1 26786
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26786 killed at Tue Nov 27 17:35:55 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:35:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26844 >/dev/null 2>/dev/null
selfserv with PID 26844 found at Tue Nov 27 17:35:55 PST 2012
selfserv with PID 26844 started at Tue Nov 27 17:35:55 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:35:56 PST 2012
ssl.sh: #2063: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26844 at Tue Nov 27 17:35:56 PST 2012
kill -USR1 26844
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26844 killed at Tue Nov 27 17:35:56 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:35:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26902 >/dev/null 2>/dev/null
selfserv with PID 26902 found at Tue Nov 27 17:35:56 PST 2012
selfserv with PID 26902 started at Tue Nov 27 17:35:56 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:57 PST 2012
ssl.sh: #2064: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26902 at Tue Nov 27 17:35:57 PST 2012
kill -USR1 26902
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26902 killed at Tue Nov 27 17:35:58 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:35:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26960 >/dev/null 2>/dev/null
selfserv with PID 26960 found at Tue Nov 27 17:35:58 PST 2012
selfserv with PID 26960 started at Tue Nov 27 17:35:58 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:58 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:35:59 PST 2012
ssl.sh: #2065: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26960 at Tue Nov 27 17:35:59 PST 2012
kill -USR1 26960
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26960 killed at Tue Nov 27 17:35:59 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:35:59 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:35:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27047 >/dev/null 2>/dev/null
selfserv with PID 27047 found at Tue Nov 27 17:35:59 PST 2012
selfserv with PID 27047 started at Tue Nov 27 17:35:59 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:35:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:00 PST 2012
ssl.sh: #2066: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27047 at Tue Nov 27 17:36:00 PST 2012
kill -USR1 27047
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27047 killed at Tue Nov 27 17:36:00 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:36:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27105 >/dev/null 2>/dev/null
selfserv with PID 27105 found at Tue Nov 27 17:36:00 PST 2012
selfserv with PID 27105 started at Tue Nov 27 17:36:00 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:01 PST 2012
ssl.sh: #2067: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27105 at Tue Nov 27 17:36:01 PST 2012
kill -USR1 27105
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27105 killed at Tue Nov 27 17:36:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:36:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27163 >/dev/null 2>/dev/null
selfserv with PID 27163 found at Tue Nov 27 17:36:01 PST 2012
selfserv with PID 27163 started at Tue Nov 27 17:36:01 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:36:01 PST 2012
ssl.sh: #2068: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27163 at Tue Nov 27 17:36:01 PST 2012
kill -USR1 27163
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27163 killed at Tue Nov 27 17:36:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:36:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27221 >/dev/null 2>/dev/null
selfserv with PID 27221 found at Tue Nov 27 17:36:01 PST 2012
selfserv with PID 27221 started at Tue Nov 27 17:36:01 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:01 PST 2012
ssl.sh: #2069: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27221 at Tue Nov 27 17:36:01 PST 2012
kill -USR1 27221
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27221 killed at Tue Nov 27 17:36:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:36:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27279 >/dev/null 2>/dev/null
selfserv with PID 27279 found at Tue Nov 27 17:36:02 PST 2012
selfserv with PID 27279 started at Tue Nov 27 17:36:02 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:02 PST 2012
ssl.sh: #2070: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27279 at Tue Nov 27 17:36:02 PST 2012
kill -USR1 27279
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27279 killed at Tue Nov 27 17:36:02 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:36:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27337 >/dev/null 2>/dev/null
selfserv with PID 27337 found at Tue Nov 27 17:36:02 PST 2012
selfserv with PID 27337 started at Tue Nov 27 17:36:02 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:36:02 PST 2012
ssl.sh: #2071: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27337 at Tue Nov 27 17:36:02 PST 2012
kill -USR1 27337
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27337 killed at Tue Nov 27 17:36:02 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:36:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27395 >/dev/null 2>/dev/null
selfserv with PID 27395 found at Tue Nov 27 17:36:02 PST 2012
selfserv with PID 27395 started at Tue Nov 27 17:36:02 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:36:03 PST 2012
ssl.sh: #2072: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27395 at Tue Nov 27 17:36:03 PST 2012
kill -USR1 27395
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27395 killed at Tue Nov 27 17:36:03 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:36:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27482 >/dev/null 2>/dev/null
selfserv with PID 27482 found at Tue Nov 27 17:36:03 PST 2012
selfserv with PID 27482 started at Tue Nov 27 17:36:03 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:06 PST 2012
ssl.sh: #2073: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27482 at Tue Nov 27 17:36:06 PST 2012
kill -USR1 27482
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27482 killed at Tue Nov 27 17:36:06 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:36:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27540 >/dev/null 2>/dev/null
selfserv with PID 27540 found at Tue Nov 27 17:36:06 PST 2012
selfserv with PID 27540 started at Tue Nov 27 17:36:06 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:07 PST 2012
ssl.sh: #2074: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27540 at Tue Nov 27 17:36:07 PST 2012
kill -USR1 27540
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27540 killed at Tue Nov 27 17:36:07 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:36:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27598 >/dev/null 2>/dev/null
selfserv with PID 27598 found at Tue Nov 27 17:36:07 PST 2012
selfserv with PID 27598 started at Tue Nov 27 17:36:07 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:10 PST 2012
ssl.sh: #2075: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27598 at Tue Nov 27 17:36:10 PST 2012
kill -USR1 27598
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27598 killed at Tue Nov 27 17:36:10 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:36:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27656 >/dev/null 2>/dev/null
selfserv with PID 27656 found at Tue Nov 27 17:36:10 PST 2012
selfserv with PID 27656 started at Tue Nov 27 17:36:10 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:11 PST 2012
ssl.sh: #2076: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27656 at Tue Nov 27 17:36:11 PST 2012
kill -USR1 27656
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27656 killed at Tue Nov 27 17:36:11 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:36:11 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27714 >/dev/null 2>/dev/null
selfserv with PID 27714 found at Tue Nov 27 17:36:11 PST 2012
selfserv with PID 27714 started at Tue Nov 27 17:36:11 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:11 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:12 PST 2012
ssl.sh: #2077: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27714 at Tue Nov 27 17:36:12 PST 2012
kill -USR1 27714
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27714 killed at Tue Nov 27 17:36:12 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:36:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27772 >/dev/null 2>/dev/null
selfserv with PID 27772 found at Tue Nov 27 17:36:12 PST 2012
selfserv with PID 27772 started at Tue Nov 27 17:36:12 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:36:13 PST 2012
ssl.sh: #2078: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27772 at Tue Nov 27 17:36:13 PST 2012
kill -USR1 27772
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27772 killed at Tue Nov 27 17:36:13 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:36:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27851 >/dev/null 2>/dev/null
selfserv with PID 27851 found at Tue Nov 27 17:36:13 PST 2012
selfserv with PID 27851 started at Tue Nov 27 17:36:13 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:14 PST 2012
ssl.sh: #2079: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27851 at Tue Nov 27 17:36:14 PST 2012
kill -USR1 27851
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27851 killed at Tue Nov 27 17:36:14 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:36:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27909 >/dev/null 2>/dev/null
selfserv with PID 27909 found at Tue Nov 27 17:36:14 PST 2012
selfserv with PID 27909 started at Tue Nov 27 17:36:14 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:14 PST 2012
ssl.sh: #2080: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27909 at Tue Nov 27 17:36:15 PST 2012
kill -USR1 27909
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27909 killed at Tue Nov 27 17:36:15 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:36:15 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27967 >/dev/null 2>/dev/null
selfserv with PID 27967 found at Tue Nov 27 17:36:15 PST 2012
selfserv with PID 27967 started at Tue Nov 27 17:36:15 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:15 PST 2012
ssl.sh: #2081: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27967 at Tue Nov 27 17:36:15 PST 2012
kill -USR1 27967
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27967 killed at Tue Nov 27 17:36:15 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:36:15 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28025 >/dev/null 2>/dev/null
selfserv with PID 28025 found at Tue Nov 27 17:36:15 PST 2012
selfserv with PID 28025 started at Tue Nov 27 17:36:15 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:16 PST 2012
ssl.sh: #2082: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28025 at Tue Nov 27 17:36:16 PST 2012
kill -USR1 28025
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28025 killed at Tue Nov 27 17:36:16 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:36:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28083 >/dev/null 2>/dev/null
selfserv with PID 28083 found at Tue Nov 27 17:36:16 PST 2012
selfserv with PID 28083 started at Tue Nov 27 17:36:16 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:16 PST 2012
ssl.sh: #2083: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28083 at Tue Nov 27 17:36:16 PST 2012
kill -USR1 28083
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28083 killed at Tue Nov 27 17:36:16 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:36:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28141 >/dev/null 2>/dev/null
selfserv with PID 28141 found at Tue Nov 27 17:36:16 PST 2012
selfserv with PID 28141 started at Tue Nov 27 17:36:16 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:36:17 PST 2012
ssl.sh: #2084: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28141 at Tue Nov 27 17:36:17 PST 2012
kill -USR1 28141
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28141 killed at Tue Nov 27 17:36:17 PST 2012
ssl.sh: SSL Cipher Coverage  - server normal/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 17:36:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:17 PST 2012
selfserv with PID 28192 started at Tue Nov 27 17:36:17 PST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2085: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c B -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2086: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c C -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2087: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2088: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c E -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2089: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2090: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2091: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2092: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2093: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2094: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2095: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2096: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2114: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2115: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2120: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2121: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2126: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2127: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2132: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2133: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2138: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2139: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28192 >/dev/null 2>/dev/null
selfserv with PID 28192 found at Tue Nov 27 17:36:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2143: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 28192 at Tue Nov 27 17:36:25 PST 2012
kill -USR1 28192
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28192 killed at Tue Nov 27 17:36:25 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:36:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29775 >/dev/null 2>/dev/null
selfserv with PID 29775 found at Tue Nov 27 17:36:25 PST 2012
selfserv with PID 29775 started at Tue Nov 27 17:36:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29775 >/dev/null 2>/dev/null
selfserv with PID 29775 found at Tue Nov 27 17:36:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29775 >/dev/null 2>/dev/null
selfserv with PID 29775 found at Tue Nov 27 17:36:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29775 >/dev/null 2>/dev/null
selfserv with PID 29775 found at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2147: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29775 >/dev/null 2>/dev/null
selfserv with PID 29775 found at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29775 at Tue Nov 27 17:36:26 PST 2012
kill -USR1 29775
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29775 killed at Tue Nov 27 17:36:26 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:36:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:26 PST 2012
selfserv with PID 29914 started at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2151: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2155: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2159: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2161: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2162: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29914 >/dev/null 2>/dev/null
selfserv with PID 29914 found at Tue Nov 27 17:36:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2163: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29914 at Tue Nov 27 17:36:28 PST 2012
kill -USR1 29914
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29914 killed at Tue Nov 27 17:36:28 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:36:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30304 >/dev/null 2>/dev/null
selfserv with PID 30304 found at Tue Nov 27 17:36:28 PST 2012
selfserv with PID 30304 started at Tue Nov 27 17:36:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2164: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30304 >/dev/null 2>/dev/null
selfserv with PID 30304 found at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2165: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30304 >/dev/null 2>/dev/null
selfserv with PID 30304 found at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2166: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30304 >/dev/null 2>/dev/null
selfserv with PID 30304 found at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2167: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30304 >/dev/null 2>/dev/null
selfserv with PID 30304 found at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2168: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30304 at Tue Nov 27 17:36:29 PST 2012
kill -USR1 30304
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30304 killed at Tue Nov 27 17:36:29 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:36:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:29 PST 2012
selfserv with PID 30443 started at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2169: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2170: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2171: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2172: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2173: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2174: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2175: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2176: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2177: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2178: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2179: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2180: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2181: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2182: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30443 >/dev/null 2>/dev/null
selfserv with PID 30443 found at Tue Nov 27 17:36:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2183: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30443 at Tue Nov 27 17:36:31 PST 2012
kill -USR1 30443
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30443 killed at Tue Nov 27 17:36:31 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:36:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30819 >/dev/null 2>/dev/null
selfserv with PID 30819 found at Tue Nov 27 17:36:32 PST 2012
selfserv with PID 30819 started at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2184: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30819 >/dev/null 2>/dev/null
selfserv with PID 30819 found at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2185: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30819 >/dev/null 2>/dev/null
selfserv with PID 30819 found at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2186: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30819 >/dev/null 2>/dev/null
selfserv with PID 30819 found at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2187: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30819 >/dev/null 2>/dev/null
selfserv with PID 30819 found at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2188: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30819 at Tue Nov 27 17:36:32 PST 2012
kill -USR1 30819
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30819 killed at Tue Nov 27 17:36:32 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:36:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30958 >/dev/null 2>/dev/null
selfserv with PID 30958 found at Tue Nov 27 17:36:32 PST 2012
selfserv with PID 30958 started at Tue Nov 27 17:36:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2189: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30958 >/dev/null 2>/dev/null
selfserv with PID 30958 found at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2190: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30958 >/dev/null 2>/dev/null
selfserv with PID 30958 found at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2191: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30958 >/dev/null 2>/dev/null
selfserv with PID 30958 found at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2192: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30958 >/dev/null 2>/dev/null
selfserv with PID 30958 found at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2193: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30958 at Tue Nov 27 17:36:33 PST 2012
kill -USR1 30958
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30958 killed at Tue Nov 27 17:36:33 PST 2012
ssl.sh: SSL Client Authentication  - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31148 >/dev/null 2>/dev/null
selfserv with PID 31148 found at Tue Nov 27 17:36:33 PST 2012
selfserv with PID 31148 started at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2194: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31148 at Tue Nov 27 17:36:33 PST 2012
kill -USR1 31148
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31148 killed at Tue Nov 27 17:36:33 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:36:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31196 >/dev/null 2>/dev/null
selfserv with PID 31196 found at Tue Nov 27 17:36:33 PST 2012
selfserv with PID 31196 started at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2195: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31196 at Tue Nov 27 17:36:34 PST 2012
kill -USR1 31196
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31196 killed at Tue Nov 27 17:36:34 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:36:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31244 >/dev/null 2>/dev/null
selfserv with PID 31244 found at Tue Nov 27 17:36:34 PST 2012
selfserv with PID 31244 started at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2196: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31244 at Tue Nov 27 17:36:34 PST 2012
kill -USR1 31244
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31244 killed at Tue Nov 27 17:36:34 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31292 >/dev/null 2>/dev/null
selfserv with PID 31292 found at Tue Nov 27 17:36:34 PST 2012
selfserv with PID 31292 started at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2197: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31292 at Tue Nov 27 17:36:34 PST 2012
kill -USR1 31292
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31292 killed at Tue Nov 27 17:36:34 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:36:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31340 >/dev/null 2>/dev/null
selfserv with PID 31340 found at Tue Nov 27 17:36:34 PST 2012
selfserv with PID 31340 started at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2198: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31340 at Tue Nov 27 17:36:34 PST 2012
kill -USR1 31340
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31340 killed at Tue Nov 27 17:36:34 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:36:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31388 >/dev/null 2>/dev/null
selfserv with PID 31388 found at Tue Nov 27 17:36:34 PST 2012
selfserv with PID 31388 started at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2199: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31388 at Tue Nov 27 17:36:35 PST 2012
kill -USR1 31388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31388 killed at Tue Nov 27 17:36:35 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31436 >/dev/null 2>/dev/null
selfserv with PID 31436 found at Tue Nov 27 17:36:35 PST 2012
selfserv with PID 31436 started at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2200: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31436 at Tue Nov 27 17:36:35 PST 2012
kill -USR1 31436
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31436 killed at Tue Nov 27 17:36:35 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:36:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31484 >/dev/null 2>/dev/null
selfserv with PID 31484 found at Tue Nov 27 17:36:35 PST 2012
selfserv with PID 31484 started at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2201: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31484 at Tue Nov 27 17:36:35 PST 2012
kill -USR1 31484
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31484 killed at Tue Nov 27 17:36:35 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:36:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31532 >/dev/null 2>/dev/null
selfserv with PID 31532 found at Tue Nov 27 17:36:35 PST 2012
selfserv with PID 31532 started at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2202: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31532 at Tue Nov 27 17:36:35 PST 2012
kill -USR1 31532
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31532 killed at Tue Nov 27 17:36:35 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31580 >/dev/null 2>/dev/null
selfserv with PID 31580 found at Tue Nov 27 17:36:35 PST 2012
selfserv with PID 31580 started at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2203: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31580 at Tue Nov 27 17:36:36 PST 2012
kill -USR1 31580
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31580 killed at Tue Nov 27 17:36:36 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:36:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31628 >/dev/null 2>/dev/null
selfserv with PID 31628 found at Tue Nov 27 17:36:36 PST 2012
selfserv with PID 31628 started at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2204: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31628 at Tue Nov 27 17:36:36 PST 2012
kill -USR1 31628
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31628 killed at Tue Nov 27 17:36:36 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:36:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31676 >/dev/null 2>/dev/null
selfserv with PID 31676 found at Tue Nov 27 17:36:36 PST 2012
selfserv with PID 31676 started at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31676 at Tue Nov 27 17:36:36 PST 2012
kill -USR1 31676
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31676 killed at Tue Nov 27 17:36:36 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31724 >/dev/null 2>/dev/null
selfserv with PID 31724 found at Tue Nov 27 17:36:36 PST 2012
selfserv with PID 31724 started at Tue Nov 27 17:36:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31724 at Tue Nov 27 17:36:37 PST 2012
kill -USR1 31724
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31724 killed at Tue Nov 27 17:36:37 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:36:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31772 >/dev/null 2>/dev/null
selfserv with PID 31772 found at Tue Nov 27 17:36:37 PST 2012
selfserv with PID 31772 started at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31772 at Tue Nov 27 17:36:37 PST 2012
kill -USR1 31772
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31772 killed at Tue Nov 27 17:36:37 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:36:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31820 >/dev/null 2>/dev/null
selfserv with PID 31820 found at Tue Nov 27 17:36:37 PST 2012
selfserv with PID 31820 started at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31820 at Tue Nov 27 17:36:37 PST 2012
kill -USR1 31820
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31820 killed at Tue Nov 27 17:36:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31868 >/dev/null 2>/dev/null
selfserv with PID 31868 found at Tue Nov 27 17:36:37 PST 2012
selfserv with PID 31868 started at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2209: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31868 at Tue Nov 27 17:36:37 PST 2012
kill -USR1 31868
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31868 killed at Tue Nov 27 17:36:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:36:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31916 >/dev/null 2>/dev/null
selfserv with PID 31916 found at Tue Nov 27 17:36:37 PST 2012
selfserv with PID 31916 started at Tue Nov 27 17:36:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2210: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31916 at Tue Nov 27 17:36:38 PST 2012
kill -USR1 31916
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31916 killed at Tue Nov 27 17:36:38 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:36:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31964 >/dev/null 2>/dev/null
selfserv with PID 31964 found at Tue Nov 27 17:36:38 PST 2012
selfserv with PID 31964 started at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31964 at Tue Nov 27 17:36:38 PST 2012
kill -USR1 31964
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31964 killed at Tue Nov 27 17:36:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32012 >/dev/null 2>/dev/null
selfserv with PID 32012 found at Tue Nov 27 17:36:38 PST 2012
selfserv with PID 32012 started at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32012 at Tue Nov 27 17:36:38 PST 2012
kill -USR1 32012
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32012 killed at Tue Nov 27 17:36:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:36:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32060 >/dev/null 2>/dev/null
selfserv with PID 32060 found at Tue Nov 27 17:36:38 PST 2012
selfserv with PID 32060 started at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32060 at Tue Nov 27 17:36:38 PST 2012
kill -USR1 32060
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32060 killed at Tue Nov 27 17:36:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:36:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32108 >/dev/null 2>/dev/null
selfserv with PID 32108 found at Tue Nov 27 17:36:38 PST 2012
selfserv with PID 32108 started at Tue Nov 27 17:36:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32108 at Tue Nov 27 17:36:39 PST 2012
kill -USR1 32108
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32108 killed at Tue Nov 27 17:36:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32156 >/dev/null 2>/dev/null
selfserv with PID 32156 found at Tue Nov 27 17:36:39 PST 2012
selfserv with PID 32156 started at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2215: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32156 at Tue Nov 27 17:36:39 PST 2012
kill -USR1 32156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32156 killed at Tue Nov 27 17:36:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:36:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32204 >/dev/null 2>/dev/null
selfserv with PID 32204 found at Tue Nov 27 17:36:39 PST 2012
selfserv with PID 32204 started at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2216: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32204 at Tue Nov 27 17:36:39 PST 2012
kill -USR1 32204
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32204 killed at Tue Nov 27 17:36:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:36:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32252 >/dev/null 2>/dev/null
selfserv with PID 32252 found at Tue Nov 27 17:36:39 PST 2012
selfserv with PID 32252 started at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32252 at Tue Nov 27 17:36:39 PST 2012
kill -USR1 32252
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32252 killed at Tue Nov 27 17:36:39 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32300 >/dev/null 2>/dev/null
selfserv with PID 32300 found at Tue Nov 27 17:36:39 PST 2012
selfserv with PID 32300 started at Tue Nov 27 17:36:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32300 at Tue Nov 27 17:36:40 PST 2012
kill -USR1 32300
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32300 killed at Tue Nov 27 17:36:40 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:36:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32348 >/dev/null 2>/dev/null
selfserv with PID 32348 found at Tue Nov 27 17:36:40 PST 2012
selfserv with PID 32348 started at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32348 at Tue Nov 27 17:36:40 PST 2012
kill -USR1 32348
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32348 killed at Tue Nov 27 17:36:40 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:36:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32396 >/dev/null 2>/dev/null
selfserv with PID 32396 found at Tue Nov 27 17:36:40 PST 2012
selfserv with PID 32396 started at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32396 at Tue Nov 27 17:36:40 PST 2012
kill -USR1 32396
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32396 killed at Tue Nov 27 17:36:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:36:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32444 >/dev/null 2>/dev/null
selfserv with PID 32444 found at Tue Nov 27 17:36:40 PST 2012
selfserv with PID 32444 started at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2221: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32444 at Tue Nov 27 17:36:40 PST 2012
kill -USR1 32444
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32444 killed at Tue Nov 27 17:36:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:36:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32492 >/dev/null 2>/dev/null
selfserv with PID 32492 found at Tue Nov 27 17:36:40 PST 2012
selfserv with PID 32492 started at Tue Nov 27 17:36:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2222: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32492 at Tue Nov 27 17:36:41 PST 2012
kill -USR1 32492
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32492 killed at Tue Nov 27 17:36:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:36:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32540 >/dev/null 2>/dev/null
selfserv with PID 32540 found at Tue Nov 27 17:36:41 PST 2012
selfserv with PID 32540 started at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32540 at Tue Nov 27 17:36:41 PST 2012
kill -USR1 32540
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32540 killed at Tue Nov 27 17:36:41 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32603 >/dev/null 2>/dev/null
selfserv with PID 32603 found at Tue Nov 27 17:36:41 PST 2012
selfserv with PID 32603 started at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32603 at Tue Nov 27 17:36:41 PST 2012
kill -USR1 32603
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32603 killed at Tue Nov 27 17:36:41 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32651 >/dev/null 2>/dev/null
selfserv with PID 32651 found at Tue Nov 27 17:36:41 PST 2012
selfserv with PID 32651 started at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32651 at Tue Nov 27 17:36:41 PST 2012
kill -USR1 32651
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32651 killed at Tue Nov 27 17:36:41 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32699 >/dev/null 2>/dev/null
selfserv with PID 32699 found at Tue Nov 27 17:36:41 PST 2012
selfserv with PID 32699 started at Tue Nov 27 17:36:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2226: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32699 at Tue Nov 27 17:36:42 PST 2012
kill -USR1 32699
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32699 killed at Tue Nov 27 17:36:42 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32747 >/dev/null 2>/dev/null
selfserv with PID 32747 found at Tue Nov 27 17:36:42 PST 2012
selfserv with PID 32747 started at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2227: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32747 at Tue Nov 27 17:36:42 PST 2012
kill -USR1 32747
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32747 killed at Tue Nov 27 17:36:42 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32795 >/dev/null 2>/dev/null
selfserv with PID 32795 found at Tue Nov 27 17:36:42 PST 2012
selfserv with PID 32795 started at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2228: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32795 at Tue Nov 27 17:36:42 PST 2012
kill -USR1 32795
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32795 killed at Tue Nov 27 17:36:42 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32843 >/dev/null 2>/dev/null
selfserv with PID 32843 found at Tue Nov 27 17:36:42 PST 2012
selfserv with PID 32843 started at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32843 at Tue Nov 27 17:36:42 PST 2012
kill -USR1 32843
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32843 killed at Tue Nov 27 17:36:42 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32891 >/dev/null 2>/dev/null
selfserv with PID 32891 found at Tue Nov 27 17:36:42 PST 2012
selfserv with PID 32891 started at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2230: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32891 at Tue Nov 27 17:36:43 PST 2012
kill -USR1 32891
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32891 killed at Tue Nov 27 17:36:43 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32939 >/dev/null 2>/dev/null
selfserv with PID 32939 found at Tue Nov 27 17:36:43 PST 2012
selfserv with PID 32939 started at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32939 at Tue Nov 27 17:36:43 PST 2012
kill -USR1 32939
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32939 killed at Tue Nov 27 17:36:43 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32987 >/dev/null 2>/dev/null
selfserv with PID 32987 found at Tue Nov 27 17:36:43 PST 2012
selfserv with PID 32987 started at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32987 at Tue Nov 27 17:36:43 PST 2012
kill -USR1 32987
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32987 killed at Tue Nov 27 17:36:43 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33035 >/dev/null 2>/dev/null
selfserv with PID 33035 found at Tue Nov 27 17:36:43 PST 2012
selfserv with PID 33035 started at Tue Nov 27 17:36:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2233: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33035 at Tue Nov 27 17:36:43 PST 2012
kill -USR1 33035
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33035 killed at Tue Nov 27 17:36:43 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33083 >/dev/null 2>/dev/null
selfserv with PID 33083 found at Tue Nov 27 17:36:44 PST 2012
selfserv with PID 33083 started at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2234: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33083 at Tue Nov 27 17:36:44 PST 2012
kill -USR1 33083
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33083 killed at Tue Nov 27 17:36:44 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33131 >/dev/null 2>/dev/null
selfserv with PID 33131 found at Tue Nov 27 17:36:44 PST 2012
selfserv with PID 33131 started at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33131 at Tue Nov 27 17:36:44 PST 2012
kill -USR1 33131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33131 killed at Tue Nov 27 17:36:44 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33179 >/dev/null 2>/dev/null
selfserv with PID 33179 found at Tue Nov 27 17:36:44 PST 2012
selfserv with PID 33179 started at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33179 at Tue Nov 27 17:36:44 PST 2012
kill -USR1 33179
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33179 killed at Tue Nov 27 17:36:44 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33227 >/dev/null 2>/dev/null
selfserv with PID 33227 found at Tue Nov 27 17:36:44 PST 2012
selfserv with PID 33227 started at Tue Nov 27 17:36:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33227 at Tue Nov 27 17:36:45 PST 2012
kill -USR1 33227
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33227 killed at Tue Nov 27 17:36:45 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33275 >/dev/null 2>/dev/null
selfserv with PID 33275 found at Tue Nov 27 17:36:45 PST 2012
selfserv with PID 33275 started at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2238: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33275 at Tue Nov 27 17:36:45 PST 2012
kill -USR1 33275
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33275 killed at Tue Nov 27 17:36:45 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33323 >/dev/null 2>/dev/null
selfserv with PID 33323 found at Tue Nov 27 17:36:45 PST 2012
selfserv with PID 33323 started at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33323 at Tue Nov 27 17:36:45 PST 2012
kill -USR1 33323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33323 killed at Tue Nov 27 17:36:45 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33371 >/dev/null 2>/dev/null
selfserv with PID 33371 found at Tue Nov 27 17:36:45 PST 2012
selfserv with PID 33371 started at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33371 at Tue Nov 27 17:36:45 PST 2012
kill -USR1 33371
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33371 killed at Tue Nov 27 17:36:45 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33419 >/dev/null 2>/dev/null
selfserv with PID 33419 found at Tue Nov 27 17:36:45 PST 2012
selfserv with PID 33419 started at Tue Nov 27 17:36:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33419 at Tue Nov 27 17:36:46 PST 2012
kill -USR1 33419
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33419 killed at Tue Nov 27 17:36:46 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:36:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33477 >/dev/null 2>/dev/null
selfserv with PID 33477 found at Tue Nov 27 17:36:46 PST 2012
selfserv with PID 33477 started at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2242: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33477 at Tue Nov 27 17:36:46 PST 2012
kill -USR1 33477
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33477 killed at Tue Nov 27 17:36:46 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:36:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33525 >/dev/null 2>/dev/null
selfserv with PID 33525 found at Tue Nov 27 17:36:46 PST 2012
selfserv with PID 33525 started at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33525 at Tue Nov 27 17:36:46 PST 2012
kill -USR1 33525
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33525 killed at Tue Nov 27 17:36:46 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:36:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33594 >/dev/null 2>/dev/null
selfserv with PID 33594 found at Tue Nov 27 17:36:46 PST 2012
selfserv with PID 33594 started at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33594 at Tue Nov 27 17:36:46 PST 2012
kill -USR1 33594
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33594 killed at Tue Nov 27 17:36:46 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:36:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33648 >/dev/null 2>/dev/null
selfserv with PID 33648 found at Tue Nov 27 17:36:46 PST 2012
selfserv with PID 33648 started at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33648 at Tue Nov 27 17:36:47 PST 2012
kill -USR1 33648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33648 killed at Tue Nov 27 17:36:47 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:36:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33702 >/dev/null 2>/dev/null
selfserv with PID 33702 found at Tue Nov 27 17:36:47 PST 2012
selfserv with PID 33702 started at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2246: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33702 at Tue Nov 27 17:36:47 PST 2012
kill -USR1 33702
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33702 killed at Tue Nov 27 17:36:47 PST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:36:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33756 >/dev/null 2>/dev/null
selfserv with PID 33756 found at Tue Nov 27 17:36:47 PST 2012
selfserv with PID 33756 started at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33756 at Tue Nov 27 17:36:47 PST 2012
kill -USR1 33756
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33756 killed at Tue Nov 27 17:36:47 PST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 17:36:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33810 >/dev/null 2>/dev/null
selfserv with PID 33810 found at Tue Nov 27 17:36:47 PST 2012
selfserv with PID 33810 started at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2248: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33810 at Tue Nov 27 17:36:47 PST 2012
kill -USR1 33810
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33810 killed at Tue Nov 27 17:36:47 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:36:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33864 >/dev/null 2>/dev/null
selfserv with PID 33864 found at Tue Nov 27 17:36:48 PST 2012
selfserv with PID 33864 started at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33864 at Tue Nov 27 17:36:48 PST 2012
kill -USR1 33864
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33864 killed at Tue Nov 27 17:36:48 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:36:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33918 >/dev/null 2>/dev/null
selfserv with PID 33918 found at Tue Nov 27 17:36:48 PST 2012
selfserv with PID 33918 started at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2250: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33918 at Tue Nov 27 17:36:48 PST 2012
kill -USR1 33918
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33918 killed at Tue Nov 27 17:36:48 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 17:36:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33972 >/dev/null 2>/dev/null
selfserv with PID 33972 found at Tue Nov 27 17:36:48 PST 2012
selfserv with PID 33972 started at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2251: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33972 at Tue Nov 27 17:36:48 PST 2012
kill -USR1 33972
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33972 killed at Tue Nov 27 17:36:48 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 17:36:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34026 >/dev/null 2>/dev/null
selfserv with PID 34026 found at Tue Nov 27 17:36:48 PST 2012
selfserv with PID 34026 started at Tue Nov 27 17:36:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2252: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 34026 at Tue Nov 27 17:36:48 PST 2012
kill -USR1 34026
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34026 killed at Tue Nov 27 17:36:48 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:36:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34080 >/dev/null 2>/dev/null
selfserv with PID 34080 found at Tue Nov 27 17:36:49 PST 2012
selfserv with PID 34080 started at Tue Nov 27 17:36:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2253: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 34080 at Tue Nov 27 17:36:49 PST 2012
kill -USR1 34080
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34080 killed at Tue Nov 27 17:36:49 PST 2012
ssl.sh: SSL Stress Test  - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:36:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34203 >/dev/null 2>/dev/null
selfserv with PID 34203 found at Tue Nov 27 17:36:49 PST 2012
selfserv with PID 34203 started at Tue Nov 27 17:36:49 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 17:36:50 PST 2012
ssl.sh: #2254: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34203 at Tue Nov 27 17:36:50 PST 2012
kill -USR1 34203
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34203 killed at Tue Nov 27 17:36:50 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:36:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34261 >/dev/null 2>/dev/null
selfserv with PID 34261 found at Tue Nov 27 17:36:50 PST 2012
selfserv with PID 34261 started at Tue Nov 27 17:36:50 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:51 PST 2012
ssl.sh: #2255: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34261 at Tue Nov 27 17:36:51 PST 2012
kill -USR1 34261
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34261 killed at Tue Nov 27 17:36:51 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:36:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34319 >/dev/null 2>/dev/null
selfserv with PID 34319 found at Tue Nov 27 17:36:51 PST 2012
selfserv with PID 34319 started at Tue Nov 27 17:36:51 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:52 PST 2012
ssl.sh: #2256: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34319 at Tue Nov 27 17:36:52 PST 2012
kill -USR1 34319
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34319 killed at Tue Nov 27 17:36:52 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:36:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34377 >/dev/null 2>/dev/null
selfserv with PID 34377 found at Tue Nov 27 17:36:52 PST 2012
selfserv with PID 34377 started at Tue Nov 27 17:36:52 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:53 PST 2012
ssl.sh: #2257: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34377 at Tue Nov 27 17:36:53 PST 2012
kill -USR1 34377
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34377 killed at Tue Nov 27 17:36:53 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:36:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34435 >/dev/null 2>/dev/null
selfserv with PID 34435 found at Tue Nov 27 17:36:53 PST 2012
selfserv with PID 34435 started at Tue Nov 27 17:36:53 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:53 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:36:54 PST 2012
ssl.sh: #2258: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34435 at Tue Nov 27 17:36:54 PST 2012
kill -USR1 34435
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34435 killed at Tue Nov 27 17:36:54 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:36:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34493 >/dev/null 2>/dev/null
selfserv with PID 34493 found at Tue Nov 27 17:36:54 PST 2012
selfserv with PID 34493 started at Tue Nov 27 17:36:54 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:36:55 PST 2012
ssl.sh: #2259: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34493 at Tue Nov 27 17:36:55 PST 2012
kill -USR1 34493
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34493 killed at Tue Nov 27 17:36:55 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:36:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34551 >/dev/null 2>/dev/null
selfserv with PID 34551 found at Tue Nov 27 17:36:55 PST 2012
selfserv with PID 34551 started at Tue Nov 27 17:36:55 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:36:57 PST 2012
ssl.sh: #2260: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34551 at Tue Nov 27 17:36:57 PST 2012
kill -USR1 34551
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34551 killed at Tue Nov 27 17:36:57 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:36:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34609 >/dev/null 2>/dev/null
selfserv with PID 34609 found at Tue Nov 27 17:36:57 PST 2012
selfserv with PID 34609 started at Tue Nov 27 17:36:57 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:57 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:36:58 PST 2012
ssl.sh: #2261: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34609 at Tue Nov 27 17:36:58 PST 2012
kill -USR1 34609
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34609 killed at Tue Nov 27 17:36:58 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 17:36:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34673 >/dev/null 2>/dev/null
selfserv with PID 34673 found at Tue Nov 27 17:36:58 PST 2012
selfserv with PID 34673 started at Tue Nov 27 17:36:58 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:36:58 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:36:59 PST 2012
ssl.sh: #2262: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34673 at Tue Nov 27 17:36:59 PST 2012
kill -USR1 34673
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34673 killed at Tue Nov 27 17:36:59 PST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:36:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:36:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34752 >/dev/null 2>/dev/null
selfserv with PID 34752 found at Tue Nov 27 17:36:59 PST 2012
selfserv with PID 34752 started at Tue Nov 27 17:36:59 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:00 PST 2012
ssl.sh: #2263: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34752 at Tue Nov 27 17:37:00 PST 2012
kill -USR1 34752
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34752 killed at Tue Nov 27 17:37:00 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34810 >/dev/null 2>/dev/null
selfserv with PID 34810 found at Tue Nov 27 17:37:00 PST 2012
selfserv with PID 34810 started at Tue Nov 27 17:37:00 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:01 PST 2012
ssl.sh: #2264: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34810 at Tue Nov 27 17:37:01 PST 2012
kill -USR1 34810
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34810 killed at Tue Nov 27 17:37:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34868 >/dev/null 2>/dev/null
selfserv with PID 34868 found at Tue Nov 27 17:37:01 PST 2012
selfserv with PID 34868 started at Tue Nov 27 17:37:01 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:01 PST 2012
ssl.sh: #2265: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34868 at Tue Nov 27 17:37:01 PST 2012
kill -USR1 34868
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34868 killed at Tue Nov 27 17:37:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:37:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34926 >/dev/null 2>/dev/null
selfserv with PID 34926 found at Tue Nov 27 17:37:02 PST 2012
selfserv with PID 34926 started at Tue Nov 27 17:37:02 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:37:02 PST 2012
ssl.sh: #2266: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34926 at Tue Nov 27 17:37:02 PST 2012
kill -USR1 34926
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34926 killed at Tue Nov 27 17:37:02 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:37:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34984 >/dev/null 2>/dev/null
selfserv with PID 34984 found at Tue Nov 27 17:37:02 PST 2012
selfserv with PID 34984 started at Tue Nov 27 17:37:02 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:02 PST 2012
ssl.sh: #2267: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34984 at Tue Nov 27 17:37:02 PST 2012
kill -USR1 34984
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34984 killed at Tue Nov 27 17:37:02 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:37:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35042 >/dev/null 2>/dev/null
selfserv with PID 35042 found at Tue Nov 27 17:37:02 PST 2012
selfserv with PID 35042 started at Tue Nov 27 17:37:02 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:03 PST 2012
ssl.sh: #2268: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35042 at Tue Nov 27 17:37:03 PST 2012
kill -USR1 35042
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35042 killed at Tue Nov 27 17:37:03 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:37:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35100 >/dev/null 2>/dev/null
selfserv with PID 35100 found at Tue Nov 27 17:37:03 PST 2012
selfserv with PID 35100 started at Tue Nov 27 17:37:03 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:37:03 PST 2012
ssl.sh: #2269: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35100 at Tue Nov 27 17:37:03 PST 2012
kill -USR1 35100
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35100 killed at Tue Nov 27 17:37:03 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:37:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35158 >/dev/null 2>/dev/null
selfserv with PID 35158 found at Tue Nov 27 17:37:03 PST 2012
selfserv with PID 35158 started at Tue Nov 27 17:37:03 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:37:03 PST 2012
ssl.sh: #2270: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35158 at Tue Nov 27 17:37:03 PST 2012
kill -USR1 35158
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35158 killed at Tue Nov 27 17:37:03 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 17:37:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35222 >/dev/null 2>/dev/null
selfserv with PID 35222 found at Tue Nov 27 17:37:04 PST 2012
selfserv with PID 35222 started at Tue Nov 27 17:37:04 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:04 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:37:05 PST 2012
ssl.sh: #2271: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35222 at Tue Nov 27 17:37:05 PST 2012
kill -USR1 35222
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35222 killed at Tue Nov 27 17:37:05 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 17:37:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35286 >/dev/null 2>/dev/null
selfserv with PID 35286 found at Tue Nov 27 17:37:05 PST 2012
selfserv with PID 35286 started at Tue Nov 27 17:37:05 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:05 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:37:07 PST 2012
ssl.sh: #2272: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35286 at Tue Nov 27 17:37:07 PST 2012
kill -USR1 35286
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35286 killed at Tue Nov 27 17:37:07 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:37:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35365 >/dev/null 2>/dev/null
selfserv with PID 35365 found at Tue Nov 27 17:37:07 PST 2012
selfserv with PID 35365 started at Tue Nov 27 17:37:07 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:09 PST 2012
ssl.sh: #2273: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35365 at Tue Nov 27 17:37:09 PST 2012
kill -USR1 35365
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35365 killed at Tue Nov 27 17:37:09 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:37:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35423 >/dev/null 2>/dev/null
selfserv with PID 35423 found at Tue Nov 27 17:37:09 PST 2012
selfserv with PID 35423 started at Tue Nov 27 17:37:10 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:10 PST 2012
ssl.sh: #2274: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35423 at Tue Nov 27 17:37:10 PST 2012
kill -USR1 35423
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35423 killed at Tue Nov 27 17:37:10 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:37:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35481 >/dev/null 2>/dev/null
selfserv with PID 35481 found at Tue Nov 27 17:37:11 PST 2012
selfserv with PID 35481 started at Tue Nov 27 17:37:11 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:11 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:13 PST 2012
ssl.sh: #2275: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35481 at Tue Nov 27 17:37:13 PST 2012
kill -USR1 35481
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35481 killed at Tue Nov 27 17:37:13 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:37:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35539 >/dev/null 2>/dev/null
selfserv with PID 35539 found at Tue Nov 27 17:37:13 PST 2012
selfserv with PID 35539 started at Tue Nov 27 17:37:13 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:14 PST 2012
ssl.sh: #2276: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35539 at Tue Nov 27 17:37:14 PST 2012
kill -USR1 35539
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35539 killed at Tue Nov 27 17:37:14 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:37:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35597 >/dev/null 2>/dev/null
selfserv with PID 35597 found at Tue Nov 27 17:37:14 PST 2012
selfserv with PID 35597 started at Tue Nov 27 17:37:15 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:16 PST 2012
ssl.sh: #2277: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35597 at Tue Nov 27 17:37:16 PST 2012
kill -USR1 35597
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35597 killed at Tue Nov 27 17:37:16 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:37:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35655 >/dev/null 2>/dev/null
selfserv with PID 35655 found at Tue Nov 27 17:37:16 PST 2012
selfserv with PID 35655 started at Tue Nov 27 17:37:16 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:37:17 PST 2012
ssl.sh: #2278: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35655 at Tue Nov 27 17:37:17 PST 2012
kill -USR1 35655
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35655 killed at Tue Nov 27 17:37:17 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35734 >/dev/null 2>/dev/null
selfserv with PID 35734 found at Tue Nov 27 17:37:17 PST 2012
selfserv with PID 35734 started at Tue Nov 27 17:37:17 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:17 PST 2012
ssl.sh: #2279: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35734 at Tue Nov 27 17:37:17 PST 2012
kill -USR1 35734
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35734 killed at Tue Nov 27 17:37:17 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:37:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35793 >/dev/null 2>/dev/null
selfserv with PID 35793 found at Tue Nov 27 17:37:18 PST 2012
selfserv with PID 35793 started at Tue Nov 27 17:37:18 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:18 PST 2012
ssl.sh: #2280: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35793 at Tue Nov 27 17:37:18 PST 2012
kill -USR1 35793
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35793 killed at Tue Nov 27 17:37:18 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35852 >/dev/null 2>/dev/null
selfserv with PID 35852 found at Tue Nov 27 17:37:18 PST 2012
selfserv with PID 35852 started at Tue Nov 27 17:37:18 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:18 PST 2012
ssl.sh: #2281: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35852 at Tue Nov 27 17:37:19 PST 2012
kill -USR1 35852
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35852 killed at Tue Nov 27 17:37:19 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35910 >/dev/null 2>/dev/null
selfserv with PID 35910 found at Tue Nov 27 17:37:19 PST 2012
selfserv with PID 35910 started at Tue Nov 27 17:37:19 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:19 PST 2012
ssl.sh: #2282: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35910 at Tue Nov 27 17:37:19 PST 2012
kill -USR1 35910
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35910 killed at Tue Nov 27 17:37:19 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:37:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35968 >/dev/null 2>/dev/null
selfserv with PID 35968 found at Tue Nov 27 17:37:19 PST 2012
selfserv with PID 35968 started at Tue Nov 27 17:37:19 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:19 PST 2012
ssl.sh: #2283: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35968 at Tue Nov 27 17:37:19 PST 2012
kill -USR1 35968
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35968 killed at Tue Nov 27 17:37:19 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:37:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36026 >/dev/null 2>/dev/null
selfserv with PID 36026 found at Tue Nov 27 17:37:20 PST 2012
selfserv with PID 36026 started at Tue Nov 27 17:37:20 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:37:20 PST 2012
ssl.sh: #2284: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36026 at Tue Nov 27 17:37:20 PST 2012
kill -USR1 36026
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36026 killed at Tue Nov 27 17:37:20 PST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 17:37:20 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:20 PST 2012
selfserv with PID 36071 started at Tue Nov 27 17:37:20 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2285: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2286: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2287: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2288: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2289: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2290: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2291: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2292: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2293: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2294: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2295: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2296: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 36071 >/dev/null 2>/dev/null
selfserv with PID 36071 found at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 36071 at Tue Nov 27 17:37:27 PST 2012
kill -USR1 36071
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36071 killed at Tue Nov 27 17:37:27 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:37:27 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 37481 >/dev/null 2>/dev/null
selfserv with PID 37481 found at Tue Nov 27 17:37:27 PST 2012
selfserv with PID 37481 started at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 37481 >/dev/null 2>/dev/null
selfserv with PID 37481 found at Tue Nov 27 17:37:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 37481 >/dev/null 2>/dev/null
selfserv with PID 37481 found at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 37481 >/dev/null 2>/dev/null
selfserv with PID 37481 found at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 37481 >/dev/null 2>/dev/null
selfserv with PID 37481 found at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 37481 at Tue Nov 27 17:37:28 PST 2012
kill -USR1 37481
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 37481 killed at Tue Nov 27 17:37:28 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:37:28 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:28 PST 2012
selfserv with PID 37620 started at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2346: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2347: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2352: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2353: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 37620 >/dev/null 2>/dev/null
selfserv with PID 37620 found at Tue Nov 27 17:37:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 37620 at Tue Nov 27 17:37:30 PST 2012
kill -USR1 37620
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 37620 killed at Tue Nov 27 17:37:30 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:37:31 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38010 >/dev/null 2>/dev/null
selfserv with PID 38010 found at Tue Nov 27 17:37:31 PST 2012
selfserv with PID 38010 started at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 38010 >/dev/null 2>/dev/null
selfserv with PID 38010 found at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 38010 >/dev/null 2>/dev/null
selfserv with PID 38010 found at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 38010 >/dev/null 2>/dev/null
selfserv with PID 38010 found at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2358: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 38010 >/dev/null 2>/dev/null
selfserv with PID 38010 found at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2359: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 38010 at Tue Nov 27 17:37:31 PST 2012
kill -USR1 38010
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38010 killed at Tue Nov 27 17:37:31 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:37:31 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:31 PST 2012
selfserv with PID 38149 started at Tue Nov 27 17:37:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2364: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2365: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2370: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2371: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 38149 >/dev/null 2>/dev/null
selfserv with PID 38149 found at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 38149 at Tue Nov 27 17:37:34 PST 2012
kill -USR1 38149
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38149 killed at Tue Nov 27 17:37:34 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:37:34 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38525 >/dev/null 2>/dev/null
selfserv with PID 38525 found at Tue Nov 27 17:37:34 PST 2012
selfserv with PID 38525 started at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2375: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 38525 >/dev/null 2>/dev/null
selfserv with PID 38525 found at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 38525 >/dev/null 2>/dev/null
selfserv with PID 38525 found at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 38525 >/dev/null 2>/dev/null
selfserv with PID 38525 found at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 38525 >/dev/null 2>/dev/null
selfserv with PID 38525 found at Tue Nov 27 17:37:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2379: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 38525 at Tue Nov 27 17:37:35 PST 2012
kill -USR1 38525
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38525 killed at Tue Nov 27 17:37:35 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:37:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38664 >/dev/null 2>/dev/null
selfserv with PID 38664 found at Tue Nov 27 17:37:35 PST 2012
selfserv with PID 38664 started at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 38664 >/dev/null 2>/dev/null
selfserv with PID 38664 found at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 38664 >/dev/null 2>/dev/null
selfserv with PID 38664 found at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 38664 >/dev/null 2>/dev/null
selfserv with PID 38664 found at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2383: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 38664 >/dev/null 2>/dev/null
selfserv with PID 38664 found at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 38664 at Tue Nov 27 17:37:35 PST 2012
kill -USR1 38664
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38664 killed at Tue Nov 27 17:37:35 PST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38854 >/dev/null 2>/dev/null
selfserv with PID 38854 found at Tue Nov 27 17:37:36 PST 2012
selfserv with PID 38854 started at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 38854 at Tue Nov 27 17:37:36 PST 2012
kill -USR1 38854
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38854 killed at Tue Nov 27 17:37:36 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:37:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38902 >/dev/null 2>/dev/null
selfserv with PID 38902 found at Tue Nov 27 17:37:36 PST 2012
selfserv with PID 38902 started at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 38902 at Tue Nov 27 17:37:36 PST 2012
kill -USR1 38902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38902 killed at Tue Nov 27 17:37:36 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:37:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38950 >/dev/null 2>/dev/null
selfserv with PID 38950 found at Tue Nov 27 17:37:36 PST 2012
selfserv with PID 38950 started at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2387: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 38950 at Tue Nov 27 17:37:36 PST 2012
kill -USR1 38950
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38950 killed at Tue Nov 27 17:37:36 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 38998 >/dev/null 2>/dev/null
selfserv with PID 38998 found at Tue Nov 27 17:37:36 PST 2012
selfserv with PID 38998 started at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2388: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 38998 at Tue Nov 27 17:37:36 PST 2012
kill -USR1 38998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 38998 killed at Tue Nov 27 17:37:36 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:37:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39046 >/dev/null 2>/dev/null
selfserv with PID 39046 found at Tue Nov 27 17:37:37 PST 2012
selfserv with PID 39046 started at Tue Nov 27 17:37:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2389: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39046 at Tue Nov 27 17:37:37 PST 2012
kill -USR1 39046
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39046 killed at Tue Nov 27 17:37:37 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:37:37 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39094 >/dev/null 2>/dev/null
selfserv with PID 39094 found at Tue Nov 27 17:37:37 PST 2012
selfserv with PID 39094 started at Tue Nov 27 17:37:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39094 at Tue Nov 27 17:37:37 PST 2012
kill -USR1 39094
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39094 killed at Tue Nov 27 17:37:37 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:37 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39142 >/dev/null 2>/dev/null
selfserv with PID 39142 found at Tue Nov 27 17:37:37 PST 2012
selfserv with PID 39142 started at Tue Nov 27 17:37:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2391: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39142 at Tue Nov 27 17:37:38 PST 2012
kill -USR1 39142
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39142 killed at Tue Nov 27 17:37:38 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:37:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39190 >/dev/null 2>/dev/null
selfserv with PID 39190 found at Tue Nov 27 17:37:38 PST 2012
selfserv with PID 39190 started at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39190 at Tue Nov 27 17:37:38 PST 2012
kill -USR1 39190
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39190 killed at Tue Nov 27 17:37:38 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:37:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39238 >/dev/null 2>/dev/null
selfserv with PID 39238 found at Tue Nov 27 17:37:38 PST 2012
selfserv with PID 39238 started at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39238 at Tue Nov 27 17:37:38 PST 2012
kill -USR1 39238
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39238 killed at Tue Nov 27 17:37:38 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39286 >/dev/null 2>/dev/null
selfserv with PID 39286 found at Tue Nov 27 17:37:38 PST 2012
selfserv with PID 39286 started at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2394: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39286 at Tue Nov 27 17:37:38 PST 2012
kill -USR1 39286
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39286 killed at Tue Nov 27 17:37:38 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:37:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39334 >/dev/null 2>/dev/null
selfserv with PID 39334 found at Tue Nov 27 17:37:38 PST 2012
selfserv with PID 39334 started at Tue Nov 27 17:37:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2395: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39334 at Tue Nov 27 17:37:39 PST 2012
kill -USR1 39334
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39334 killed at Tue Nov 27 17:37:39 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:37:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39382 >/dev/null 2>/dev/null
selfserv with PID 39382 found at Tue Nov 27 17:37:39 PST 2012
selfserv with PID 39382 started at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39382 at Tue Nov 27 17:37:39 PST 2012
kill -USR1 39382
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39382 killed at Tue Nov 27 17:37:39 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39430 >/dev/null 2>/dev/null
selfserv with PID 39430 found at Tue Nov 27 17:37:39 PST 2012
selfserv with PID 39430 started at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2397: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39430 at Tue Nov 27 17:37:39 PST 2012
kill -USR1 39430
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39430 killed at Tue Nov 27 17:37:39 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:37:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39478 >/dev/null 2>/dev/null
selfserv with PID 39478 found at Tue Nov 27 17:37:39 PST 2012
selfserv with PID 39478 started at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39478 at Tue Nov 27 17:37:39 PST 2012
kill -USR1 39478
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39478 killed at Tue Nov 27 17:37:39 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:37:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39526 >/dev/null 2>/dev/null
selfserv with PID 39526 found at Tue Nov 27 17:37:39 PST 2012
selfserv with PID 39526 started at Tue Nov 27 17:37:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39526 at Tue Nov 27 17:37:40 PST 2012
kill -USR1 39526
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39526 killed at Tue Nov 27 17:37:40 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39574 >/dev/null 2>/dev/null
selfserv with PID 39574 found at Tue Nov 27 17:37:40 PST 2012
selfserv with PID 39574 started at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2400: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39574 at Tue Nov 27 17:37:40 PST 2012
kill -USR1 39574
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39574 killed at Tue Nov 27 17:37:40 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:37:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39622 >/dev/null 2>/dev/null
selfserv with PID 39622 found at Tue Nov 27 17:37:40 PST 2012
selfserv with PID 39622 started at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2401: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39622 at Tue Nov 27 17:37:40 PST 2012
kill -USR1 39622
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39622 killed at Tue Nov 27 17:37:40 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:37:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39670 >/dev/null 2>/dev/null
selfserv with PID 39670 found at Tue Nov 27 17:37:40 PST 2012
selfserv with PID 39670 started at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2402: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39670 at Tue Nov 27 17:37:40 PST 2012
kill -USR1 39670
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39670 killed at Tue Nov 27 17:37:40 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39718 >/dev/null 2>/dev/null
selfserv with PID 39718 found at Tue Nov 27 17:37:40 PST 2012
selfserv with PID 39718 started at Tue Nov 27 17:37:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2403: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39718 at Tue Nov 27 17:37:41 PST 2012
kill -USR1 39718
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39718 killed at Tue Nov 27 17:37:41 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:37:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39766 >/dev/null 2>/dev/null
selfserv with PID 39766 found at Tue Nov 27 17:37:41 PST 2012
selfserv with PID 39766 started at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2404: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39766 at Tue Nov 27 17:37:41 PST 2012
kill -USR1 39766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39766 killed at Tue Nov 27 17:37:41 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:37:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39814 >/dev/null 2>/dev/null
selfserv with PID 39814 found at Tue Nov 27 17:37:41 PST 2012
selfserv with PID 39814 started at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2405: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39814 at Tue Nov 27 17:37:41 PST 2012
kill -USR1 39814
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39814 killed at Tue Nov 27 17:37:41 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39862 >/dev/null 2>/dev/null
selfserv with PID 39862 found at Tue Nov 27 17:37:41 PST 2012
selfserv with PID 39862 started at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2406: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39862 at Tue Nov 27 17:37:41 PST 2012
kill -USR1 39862
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39862 killed at Tue Nov 27 17:37:41 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:37:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39910 >/dev/null 2>/dev/null
selfserv with PID 39910 found at Tue Nov 27 17:37:41 PST 2012
selfserv with PID 39910 started at Tue Nov 27 17:37:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2407: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 39910 at Tue Nov 27 17:37:42 PST 2012
kill -USR1 39910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39910 killed at Tue Nov 27 17:37:42 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:37:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 39958 >/dev/null 2>/dev/null
selfserv with PID 39958 found at Tue Nov 27 17:37:42 PST 2012
selfserv with PID 39958 started at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2408: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 39958 at Tue Nov 27 17:37:42 PST 2012
kill -USR1 39958
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 39958 killed at Tue Nov 27 17:37:42 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40006 >/dev/null 2>/dev/null
selfserv with PID 40006 found at Tue Nov 27 17:37:42 PST 2012
selfserv with PID 40006 started at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2409: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40006 at Tue Nov 27 17:37:42 PST 2012
kill -USR1 40006
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40006 killed at Tue Nov 27 17:37:42 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:37:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40054 >/dev/null 2>/dev/null
selfserv with PID 40054 found at Tue Nov 27 17:37:42 PST 2012
selfserv with PID 40054 started at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2410: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40054 at Tue Nov 27 17:37:42 PST 2012
kill -USR1 40054
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40054 killed at Tue Nov 27 17:37:42 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:37:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40102 >/dev/null 2>/dev/null
selfserv with PID 40102 found at Tue Nov 27 17:37:42 PST 2012
selfserv with PID 40102 started at Tue Nov 27 17:37:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2411: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40102 at Tue Nov 27 17:37:43 PST 2012
kill -USR1 40102
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40102 killed at Tue Nov 27 17:37:43 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:37:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40150 >/dev/null 2>/dev/null
selfserv with PID 40150 found at Tue Nov 27 17:37:43 PST 2012
selfserv with PID 40150 started at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2412: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 40150 at Tue Nov 27 17:37:43 PST 2012
kill -USR1 40150
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40150 killed at Tue Nov 27 17:37:43 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:37:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40198 >/dev/null 2>/dev/null
selfserv with PID 40198 found at Tue Nov 27 17:37:43 PST 2012
selfserv with PID 40198 started at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2413: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 40198 at Tue Nov 27 17:37:43 PST 2012
kill -USR1 40198
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40198 killed at Tue Nov 27 17:37:43 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:37:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40246 >/dev/null 2>/dev/null
selfserv with PID 40246 found at Tue Nov 27 17:37:43 PST 2012
selfserv with PID 40246 started at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2414: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40246 at Tue Nov 27 17:37:43 PST 2012
kill -USR1 40246
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40246 killed at Tue Nov 27 17:37:43 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40309 >/dev/null 2>/dev/null
selfserv with PID 40309 found at Tue Nov 27 17:37:43 PST 2012
selfserv with PID 40309 started at Tue Nov 27 17:37:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2415: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40309 at Tue Nov 27 17:37:44 PST 2012
kill -USR1 40309
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40309 killed at Tue Nov 27 17:37:44 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40357 >/dev/null 2>/dev/null
selfserv with PID 40357 found at Tue Nov 27 17:37:44 PST 2012
selfserv with PID 40357 started at Tue Nov 27 17:37:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2416: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40357 at Tue Nov 27 17:37:44 PST 2012
kill -USR1 40357
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40357 killed at Tue Nov 27 17:37:44 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40405 >/dev/null 2>/dev/null
selfserv with PID 40405 found at Tue Nov 27 17:37:44 PST 2012
selfserv with PID 40405 started at Tue Nov 27 17:37:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2417: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 40405 at Tue Nov 27 17:37:44 PST 2012
kill -USR1 40405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40405 killed at Tue Nov 27 17:37:44 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40453 >/dev/null 2>/dev/null
selfserv with PID 40453 found at Tue Nov 27 17:37:44 PST 2012
selfserv with PID 40453 started at Tue Nov 27 17:37:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2418: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40453 at Tue Nov 27 17:37:44 PST 2012
kill -USR1 40453
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40453 killed at Tue Nov 27 17:37:44 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40501 >/dev/null 2>/dev/null
selfserv with PID 40501 found at Tue Nov 27 17:37:45 PST 2012
selfserv with PID 40501 started at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2419: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40501 at Tue Nov 27 17:37:45 PST 2012
kill -USR1 40501
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40501 killed at Tue Nov 27 17:37:45 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40549 >/dev/null 2>/dev/null
selfserv with PID 40549 found at Tue Nov 27 17:37:45 PST 2012
selfserv with PID 40549 started at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2420: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40549 at Tue Nov 27 17:37:45 PST 2012
kill -USR1 40549
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40549 killed at Tue Nov 27 17:37:45 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40597 >/dev/null 2>/dev/null
selfserv with PID 40597 found at Tue Nov 27 17:37:45 PST 2012
selfserv with PID 40597 started at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2421: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 40597 at Tue Nov 27 17:37:45 PST 2012
kill -USR1 40597
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40597 killed at Tue Nov 27 17:37:45 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40645 >/dev/null 2>/dev/null
selfserv with PID 40645 found at Tue Nov 27 17:37:45 PST 2012
selfserv with PID 40645 started at Tue Nov 27 17:37:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2422: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40645 at Tue Nov 27 17:37:46 PST 2012
kill -USR1 40645
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40645 killed at Tue Nov 27 17:37:46 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40703 >/dev/null 2>/dev/null
selfserv with PID 40703 found at Tue Nov 27 17:37:46 PST 2012
selfserv with PID 40703 started at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2423: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40703 at Tue Nov 27 17:37:46 PST 2012
kill -USR1 40703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40703 killed at Tue Nov 27 17:37:46 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40751 >/dev/null 2>/dev/null
selfserv with PID 40751 found at Tue Nov 27 17:37:46 PST 2012
selfserv with PID 40751 started at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2424: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40751 at Tue Nov 27 17:37:46 PST 2012
kill -USR1 40751
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40751 killed at Tue Nov 27 17:37:46 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40799 >/dev/null 2>/dev/null
selfserv with PID 40799 found at Tue Nov 27 17:37:46 PST 2012
selfserv with PID 40799 started at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2425: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 40799 at Tue Nov 27 17:37:46 PST 2012
kill -USR1 40799
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40799 killed at Tue Nov 27 17:37:46 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40847 >/dev/null 2>/dev/null
selfserv with PID 40847 found at Tue Nov 27 17:37:46 PST 2012
selfserv with PID 40847 started at Tue Nov 27 17:37:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2426: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40847 at Tue Nov 27 17:37:47 PST 2012
kill -USR1 40847
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40847 killed at Tue Nov 27 17:37:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40895 >/dev/null 2>/dev/null
selfserv with PID 40895 found at Tue Nov 27 17:37:47 PST 2012
selfserv with PID 40895 started at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40895 at Tue Nov 27 17:37:47 PST 2012
kill -USR1 40895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40895 killed at Tue Nov 27 17:37:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40943 >/dev/null 2>/dev/null
selfserv with PID 40943 found at Tue Nov 27 17:37:47 PST 2012
selfserv with PID 40943 started at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 40943 at Tue Nov 27 17:37:47 PST 2012
kill -USR1 40943
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40943 killed at Tue Nov 27 17:37:47 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 40991 >/dev/null 2>/dev/null
selfserv with PID 40991 found at Tue Nov 27 17:37:47 PST 2012
selfserv with PID 40991 started at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2429: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 40991 at Tue Nov 27 17:37:47 PST 2012
kill -USR1 40991
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 40991 killed at Tue Nov 27 17:37:47 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41039 >/dev/null 2>/dev/null
selfserv with PID 41039 found at Tue Nov 27 17:37:47 PST 2012
selfserv with PID 41039 started at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2430: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 41039 at Tue Nov 27 17:37:48 PST 2012
kill -USR1 41039
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41039 killed at Tue Nov 27 17:37:48 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41087 >/dev/null 2>/dev/null
selfserv with PID 41087 found at Tue Nov 27 17:37:48 PST 2012
selfserv with PID 41087 started at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2431: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 41087 at Tue Nov 27 17:37:48 PST 2012
kill -USR1 41087
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41087 killed at Tue Nov 27 17:37:48 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41135 >/dev/null 2>/dev/null
selfserv with PID 41135 found at Tue Nov 27 17:37:48 PST 2012
selfserv with PID 41135 started at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2432: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 41135 at Tue Nov 27 17:37:48 PST 2012
kill -USR1 41135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41135 killed at Tue Nov 27 17:37:48 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:37:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41183 >/dev/null 2>/dev/null
selfserv with PID 41183 found at Tue Nov 27 17:37:48 PST 2012
selfserv with PID 41183 started at Tue Nov 27 17:37:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2433: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 41183 at Tue Nov 27 17:37:48 PST 2012
kill -USR1 41183
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41183 killed at Tue Nov 27 17:37:48 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:37:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41231 >/dev/null 2>/dev/null
selfserv with PID 41231 found at Tue Nov 27 17:37:49 PST 2012
selfserv with PID 41231 started at Tue Nov 27 17:37:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2434: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 41231 at Tue Nov 27 17:37:49 PST 2012
kill -USR1 41231
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41231 killed at Tue Nov 27 17:37:49 PST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:37:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41395 >/dev/null 2>/dev/null
selfserv with PID 41395 found at Tue Nov 27 17:37:49 PST 2012
selfserv with PID 41395 started at Tue Nov 27 17:37:49 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:50 PST 2012
ssl.sh: #2435: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41395 at Tue Nov 27 17:37:50 PST 2012
kill -USR1 41395
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41395 killed at Tue Nov 27 17:37:50 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:37:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41453 >/dev/null 2>/dev/null
selfserv with PID 41453 found at Tue Nov 27 17:37:50 PST 2012
selfserv with PID 41453 started at Tue Nov 27 17:37:50 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:51 PST 2012
ssl.sh: #2436: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41453 at Tue Nov 27 17:37:51 PST 2012
kill -USR1 41453
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41453 killed at Tue Nov 27 17:37:51 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:37:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41511 >/dev/null 2>/dev/null
selfserv with PID 41511 found at Tue Nov 27 17:37:51 PST 2012
selfserv with PID 41511 started at Tue Nov 27 17:37:51 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:52 PST 2012
ssl.sh: #2437: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41511 at Tue Nov 27 17:37:52 PST 2012
kill -USR1 41511
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41511 killed at Tue Nov 27 17:37:52 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:37:52 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41569 >/dev/null 2>/dev/null
selfserv with PID 41569 found at Tue Nov 27 17:37:52 PST 2012
selfserv with PID 41569 started at Tue Nov 27 17:37:52 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:37:53 PST 2012
ssl.sh: #2438: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41569 at Tue Nov 27 17:37:54 PST 2012
kill -USR1 41569
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41569 killed at Tue Nov 27 17:37:54 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:37:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41627 >/dev/null 2>/dev/null
selfserv with PID 41627 found at Tue Nov 27 17:37:54 PST 2012
selfserv with PID 41627 started at Tue Nov 27 17:37:54 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:37:55 PST 2012
ssl.sh: #2439: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41627 at Tue Nov 27 17:37:55 PST 2012
kill -USR1 41627
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41627 killed at Tue Nov 27 17:37:55 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:37:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41685 >/dev/null 2>/dev/null
selfserv with PID 41685 found at Tue Nov 27 17:37:55 PST 2012
selfserv with PID 41685 started at Tue Nov 27 17:37:55 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:37:56 PST 2012
ssl.sh: #2440: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41685 at Tue Nov 27 17:37:56 PST 2012
kill -USR1 41685
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41685 killed at Tue Nov 27 17:37:56 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:37:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41743 >/dev/null 2>/dev/null
selfserv with PID 41743 found at Tue Nov 27 17:37:56 PST 2012
selfserv with PID 41743 started at Tue Nov 27 17:37:56 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:37:57 PST 2012
ssl.sh: #2441: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41743 at Tue Nov 27 17:37:57 PST 2012
kill -USR1 41743
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41743 killed at Tue Nov 27 17:37:57 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41830 >/dev/null 2>/dev/null
selfserv with PID 41830 found at Tue Nov 27 17:37:58 PST 2012
selfserv with PID 41830 started at Tue Nov 27 17:37:58 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:58 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:58 PST 2012
ssl.sh: #2442: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41830 at Tue Nov 27 17:37:58 PST 2012
kill -USR1 41830
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41830 killed at Tue Nov 27 17:37:58 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:37:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41888 >/dev/null 2>/dev/null
selfserv with PID 41888 found at Tue Nov 27 17:37:58 PST 2012
selfserv with PID 41888 started at Tue Nov 27 17:37:59 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:37:59 PST 2012
ssl.sh: #2443: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41888 at Tue Nov 27 17:37:59 PST 2012
kill -USR1 41888
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41888 killed at Tue Nov 27 17:37:59 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:37:59 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:37:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 41946 >/dev/null 2>/dev/null
selfserv with PID 41946 found at Tue Nov 27 17:37:59 PST 2012
selfserv with PID 41946 started at Tue Nov 27 17:37:59 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:37:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:38:00 PST 2012
ssl.sh: #2444: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 41946 at Tue Nov 27 17:38:00 PST 2012
kill -USR1 41946
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 41946 killed at Tue Nov 27 17:38:00 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:38:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42004 >/dev/null 2>/dev/null
selfserv with PID 42004 found at Tue Nov 27 17:38:00 PST 2012
selfserv with PID 42004 started at Tue Nov 27 17:38:00 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:00 PST 2012
ssl.sh: #2445: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42004 at Tue Nov 27 17:38:00 PST 2012
kill -USR1 42004
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42004 killed at Tue Nov 27 17:38:00 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:38:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42062 >/dev/null 2>/dev/null
selfserv with PID 42062 found at Tue Nov 27 17:38:00 PST 2012
selfserv with PID 42062 started at Tue Nov 27 17:38:00 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:00 PST 2012
ssl.sh: #2446: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42062 at Tue Nov 27 17:38:00 PST 2012
kill -USR1 42062
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42062 killed at Tue Nov 27 17:38:00 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:38:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42120 >/dev/null 2>/dev/null
selfserv with PID 42120 found at Tue Nov 27 17:38:00 PST 2012
selfserv with PID 42120 started at Tue Nov 27 17:38:00 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:38:01 PST 2012
ssl.sh: #2447: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42120 at Tue Nov 27 17:38:01 PST 2012
kill -USR1 42120
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42120 killed at Tue Nov 27 17:38:01 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:38:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42178 >/dev/null 2>/dev/null
selfserv with PID 42178 found at Tue Nov 27 17:38:01 PST 2012
selfserv with PID 42178 started at Tue Nov 27 17:38:01 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:38:01 PST 2012
ssl.sh: #2448: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42178 at Tue Nov 27 17:38:01 PST 2012
kill -USR1 42178
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42178 killed at Tue Nov 27 17:38:01 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:38:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42265 >/dev/null 2>/dev/null
selfserv with PID 42265 found at Tue Nov 27 17:38:01 PST 2012
selfserv with PID 42265 started at Tue Nov 27 17:38:01 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:38:04 PST 2012
ssl.sh: #2449: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42265 at Tue Nov 27 17:38:04 PST 2012
kill -USR1 42265
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42265 killed at Tue Nov 27 17:38:04 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:38:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42323 >/dev/null 2>/dev/null
selfserv with PID 42323 found at Tue Nov 27 17:38:04 PST 2012
selfserv with PID 42323 started at Tue Nov 27 17:38:04 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:04 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:05 PST 2012
ssl.sh: #2450: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42323 at Tue Nov 27 17:38:05 PST 2012
kill -USR1 42323
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42323 killed at Tue Nov 27 17:38:05 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:38:05 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42381 >/dev/null 2>/dev/null
selfserv with PID 42381 found at Tue Nov 27 17:38:05 PST 2012
selfserv with PID 42381 started at Tue Nov 27 17:38:06 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:38:08 PST 2012
ssl.sh: #2451: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42381 at Tue Nov 27 17:38:08 PST 2012
kill -USR1 42381
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42381 killed at Tue Nov 27 17:38:08 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:38:08 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42439 >/dev/null 2>/dev/null
selfserv with PID 42439 found at Tue Nov 27 17:38:08 PST 2012
selfserv with PID 42439 started at Tue Nov 27 17:38:08 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:08 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:38:09 PST 2012
ssl.sh: #2452: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42439 at Tue Nov 27 17:38:09 PST 2012
kill -USR1 42439
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42439 killed at Tue Nov 27 17:38:09 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:38:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42497 >/dev/null 2>/dev/null
selfserv with PID 42497 found at Tue Nov 27 17:38:09 PST 2012
selfserv with PID 42497 started at Tue Nov 27 17:38:09 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:09 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:10 PST 2012
ssl.sh: #2453: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42497 at Tue Nov 27 17:38:10 PST 2012
kill -USR1 42497
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42497 killed at Tue Nov 27 17:38:10 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:38:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42555 >/dev/null 2>/dev/null
selfserv with PID 42555 found at Tue Nov 27 17:38:11 PST 2012
selfserv with PID 42555 started at Tue Nov 27 17:38:11 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:11 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:38:12 PST 2012
ssl.sh: #2454: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42555 at Tue Nov 27 17:38:12 PST 2012
kill -USR1 42555
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42555 killed at Tue Nov 27 17:38:12 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:38:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42634 >/dev/null 2>/dev/null
selfserv with PID 42634 found at Tue Nov 27 17:38:12 PST 2012
selfserv with PID 42634 started at Tue Nov 27 17:38:12 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:38:12 PST 2012
ssl.sh: #2455: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42634 at Tue Nov 27 17:38:13 PST 2012
kill -USR1 42634
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42634 killed at Tue Nov 27 17:38:13 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:38:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42692 >/dev/null 2>/dev/null
selfserv with PID 42692 found at Tue Nov 27 17:38:13 PST 2012
selfserv with PID 42692 started at Tue Nov 27 17:38:13 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:13 PST 2012
ssl.sh: #2456: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42692 at Tue Nov 27 17:38:13 PST 2012
kill -USR1 42692
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42692 killed at Tue Nov 27 17:38:13 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:38:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42750 >/dev/null 2>/dev/null
selfserv with PID 42750 found at Tue Nov 27 17:38:13 PST 2012
selfserv with PID 42750 started at Tue Nov 27 17:38:13 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:38:14 PST 2012
ssl.sh: #2457: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42750 at Tue Nov 27 17:38:14 PST 2012
kill -USR1 42750
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42750 killed at Tue Nov 27 17:38:14 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:38:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42808 >/dev/null 2>/dev/null
selfserv with PID 42808 found at Tue Nov 27 17:38:14 PST 2012
selfserv with PID 42808 started at Tue Nov 27 17:38:14 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:38:14 PST 2012
ssl.sh: #2458: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42808 at Tue Nov 27 17:38:14 PST 2012
kill -USR1 42808
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42808 killed at Tue Nov 27 17:38:14 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:38:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42866 >/dev/null 2>/dev/null
selfserv with PID 42866 found at Tue Nov 27 17:38:14 PST 2012
selfserv with PID 42866 started at Tue Nov 27 17:38:14 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:15 PST 2012
ssl.sh: #2459: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42866 at Tue Nov 27 17:38:15 PST 2012
kill -USR1 42866
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42866 killed at Tue Nov 27 17:38:15 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:38:15 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 42924 >/dev/null 2>/dev/null
selfserv with PID 42924 found at Tue Nov 27 17:38:15 PST 2012
selfserv with PID 42924 started at Tue Nov 27 17:38:15 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:38:15 PST 2012
ssl.sh: #2460: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 42924 at Tue Nov 27 17:38:15 PST 2012
kill -USR1 42924
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 42924 killed at Tue Nov 27 17:38:15 PST 2012
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the  server
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2461:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -list
ssl.sh: #2462:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2463:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  server
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2464:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -list
ssl.sh: #2465:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2466:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server fips/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 17:38:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:16 PST 2012
selfserv with PID 43037 started at Tue Nov 27 17:38:16 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2467: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2468: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2469: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2470: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2471: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2472: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2473: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2474: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2475: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2476: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2477: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2478: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 43037 >/dev/null 2>/dev/null
selfserv with PID 43037 found at Tue Nov 27 17:38:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 43037 at Tue Nov 27 17:38:22 PST 2012
kill -USR1 43037
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 43037 killed at Tue Nov 27 17:38:22 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:38:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 44253 >/dev/null 2>/dev/null
selfserv with PID 44253 found at Tue Nov 27 17:38:22 PST 2012
selfserv with PID 44253 started at Tue Nov 27 17:38:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 44253 >/dev/null 2>/dev/null
selfserv with PID 44253 found at Tue Nov 27 17:38:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44253 >/dev/null 2>/dev/null
selfserv with PID 44253 found at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44253 >/dev/null 2>/dev/null
selfserv with PID 44253 found at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44253 >/dev/null 2>/dev/null
selfserv with PID 44253 found at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 44253 at Tue Nov 27 17:38:23 PST 2012
kill -USR1 44253
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 44253 killed at Tue Nov 27 17:38:23 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:38:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:23 PST 2012
selfserv with PID 44392 started at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44392 >/dev/null 2>/dev/null
selfserv with PID 44392 found at Tue Nov 27 17:38:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 44392 at Tue Nov 27 17:38:25 PST 2012
kill -USR1 44392
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 44392 killed at Tue Nov 27 17:38:25 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:38:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 44782 >/dev/null 2>/dev/null
selfserv with PID 44782 found at Tue Nov 27 17:38:26 PST 2012
selfserv with PID 44782 started at Tue Nov 27 17:38:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 44782 >/dev/null 2>/dev/null
selfserv with PID 44782 found at Tue Nov 27 17:38:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44782 >/dev/null 2>/dev/null
selfserv with PID 44782 found at Tue Nov 27 17:38:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44782 >/dev/null 2>/dev/null
selfserv with PID 44782 found at Tue Nov 27 17:38:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44782 >/dev/null 2>/dev/null
selfserv with PID 44782 found at Tue Nov 27 17:38:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 44782 at Tue Nov 27 17:38:26 PST 2012
kill -USR1 44782
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 44782 killed at Tue Nov 27 17:38:26 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:38:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:27 PST 2012
selfserv with PID 44921 started at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 44921 >/dev/null 2>/dev/null
selfserv with PID 44921 found at Tue Nov 27 17:38:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 44921 at Tue Nov 27 17:38:29 PST 2012
kill -USR1 44921
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 44921 killed at Tue Nov 27 17:38:29 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:38:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45297 >/dev/null 2>/dev/null
selfserv with PID 45297 found at Tue Nov 27 17:38:29 PST 2012
selfserv with PID 45297 started at Tue Nov 27 17:38:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 45297 >/dev/null 2>/dev/null
selfserv with PID 45297 found at Tue Nov 27 17:38:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 45297 >/dev/null 2>/dev/null
selfserv with PID 45297 found at Tue Nov 27 17:38:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 45297 >/dev/null 2>/dev/null
selfserv with PID 45297 found at Tue Nov 27 17:38:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 45297 >/dev/null 2>/dev/null
selfserv with PID 45297 found at Tue Nov 27 17:38:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 45297 at Tue Nov 27 17:38:30 PST 2012
kill -USR1 45297
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45297 killed at Tue Nov 27 17:38:30 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:38:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45436 >/dev/null 2>/dev/null
selfserv with PID 45436 found at Tue Nov 27 17:38:30 PST 2012
selfserv with PID 45436 started at Tue Nov 27 17:38:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 45436 >/dev/null 2>/dev/null
selfserv with PID 45436 found at Tue Nov 27 17:38:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 45436 >/dev/null 2>/dev/null
selfserv with PID 45436 found at Tue Nov 27 17:38:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 45436 >/dev/null 2>/dev/null
selfserv with PID 45436 found at Tue Nov 27 17:38:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 45436 >/dev/null 2>/dev/null
selfserv with PID 45436 found at Tue Nov 27 17:38:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45436 at Tue Nov 27 17:38:31 PST 2012
kill -USR1 45436
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45436 killed at Tue Nov 27 17:38:31 PST 2012
ssl.sh: SSL Client Authentication  - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45626 >/dev/null 2>/dev/null
selfserv with PID 45626 found at Tue Nov 27 17:38:31 PST 2012
selfserv with PID 45626 started at Tue Nov 27 17:38:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45626 at Tue Nov 27 17:38:31 PST 2012
kill -USR1 45626
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45626 killed at Tue Nov 27 17:38:31 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:38:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45674 >/dev/null 2>/dev/null
selfserv with PID 45674 found at Tue Nov 27 17:38:31 PST 2012
selfserv with PID 45674 started at Tue Nov 27 17:38:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45674 at Tue Nov 27 17:38:32 PST 2012
kill -USR1 45674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45674 killed at Tue Nov 27 17:38:32 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:38:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45722 >/dev/null 2>/dev/null
selfserv with PID 45722 found at Tue Nov 27 17:38:32 PST 2012
selfserv with PID 45722 started at Tue Nov 27 17:38:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45722 at Tue Nov 27 17:38:32 PST 2012
kill -USR1 45722
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45722 killed at Tue Nov 27 17:38:32 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45770 >/dev/null 2>/dev/null
selfserv with PID 45770 found at Tue Nov 27 17:38:32 PST 2012
selfserv with PID 45770 started at Tue Nov 27 17:38:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2560: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 45770 at Tue Nov 27 17:38:32 PST 2012
kill -USR1 45770
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45770 killed at Tue Nov 27 17:38:32 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:38:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45818 >/dev/null 2>/dev/null
selfserv with PID 45818 found at Tue Nov 27 17:38:33 PST 2012
selfserv with PID 45818 started at Tue Nov 27 17:38:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2561: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 45818 at Tue Nov 27 17:38:33 PST 2012
kill -USR1 45818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45818 killed at Tue Nov 27 17:38:33 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:38:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45866 >/dev/null 2>/dev/null
selfserv with PID 45866 found at Tue Nov 27 17:38:33 PST 2012
selfserv with PID 45866 started at Tue Nov 27 17:38:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45866 at Tue Nov 27 17:38:33 PST 2012
kill -USR1 45866
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45866 killed at Tue Nov 27 17:38:33 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45914 >/dev/null 2>/dev/null
selfserv with PID 45914 found at Tue Nov 27 17:38:33 PST 2012
selfserv with PID 45914 started at Tue Nov 27 17:38:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45914 at Tue Nov 27 17:38:34 PST 2012
kill -USR1 45914
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45914 killed at Tue Nov 27 17:38:34 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:38:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 45962 >/dev/null 2>/dev/null
selfserv with PID 45962 found at Tue Nov 27 17:38:34 PST 2012
selfserv with PID 45962 started at Tue Nov 27 17:38:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 45962 at Tue Nov 27 17:38:34 PST 2012
kill -USR1 45962
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 45962 killed at Tue Nov 27 17:38:34 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:38:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46010 >/dev/null 2>/dev/null
selfserv with PID 46010 found at Tue Nov 27 17:38:34 PST 2012
selfserv with PID 46010 started at Tue Nov 27 17:38:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46010 at Tue Nov 27 17:38:34 PST 2012
kill -USR1 46010
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46010 killed at Tue Nov 27 17:38:34 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46058 >/dev/null 2>/dev/null
selfserv with PID 46058 found at Tue Nov 27 17:38:34 PST 2012
selfserv with PID 46058 started at Tue Nov 27 17:38:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2566: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46058 at Tue Nov 27 17:38:35 PST 2012
kill -USR1 46058
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46058 killed at Tue Nov 27 17:38:35 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:38:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46106 >/dev/null 2>/dev/null
selfserv with PID 46106 found at Tue Nov 27 17:38:35 PST 2012
selfserv with PID 46106 started at Tue Nov 27 17:38:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2567: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46106 at Tue Nov 27 17:38:35 PST 2012
kill -USR1 46106
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46106 killed at Tue Nov 27 17:38:35 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:38:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46154 >/dev/null 2>/dev/null
selfserv with PID 46154 found at Tue Nov 27 17:38:35 PST 2012
selfserv with PID 46154 started at Tue Nov 27 17:38:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46154 at Tue Nov 27 17:38:35 PST 2012
kill -USR1 46154
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46154 killed at Tue Nov 27 17:38:35 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46202 >/dev/null 2>/dev/null
selfserv with PID 46202 found at Tue Nov 27 17:38:35 PST 2012
selfserv with PID 46202 started at Tue Nov 27 17:38:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46202 at Tue Nov 27 17:38:36 PST 2012
kill -USR1 46202
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46202 killed at Tue Nov 27 17:38:36 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:38:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46250 >/dev/null 2>/dev/null
selfserv with PID 46250 found at Tue Nov 27 17:38:36 PST 2012
selfserv with PID 46250 started at Tue Nov 27 17:38:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46250 at Tue Nov 27 17:38:36 PST 2012
kill -USR1 46250
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46250 killed at Tue Nov 27 17:38:36 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:38:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46298 >/dev/null 2>/dev/null
selfserv with PID 46298 found at Tue Nov 27 17:38:36 PST 2012
selfserv with PID 46298 started at Tue Nov 27 17:38:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46298 at Tue Nov 27 17:38:37 PST 2012
kill -USR1 46298
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46298 killed at Tue Nov 27 17:38:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46346 >/dev/null 2>/dev/null
selfserv with PID 46346 found at Tue Nov 27 17:38:37 PST 2012
selfserv with PID 46346 started at Tue Nov 27 17:38:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2572: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46346 at Tue Nov 27 17:38:37 PST 2012
kill -USR1 46346
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46346 killed at Tue Nov 27 17:38:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:38:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46394 >/dev/null 2>/dev/null
selfserv with PID 46394 found at Tue Nov 27 17:38:37 PST 2012
selfserv with PID 46394 started at Tue Nov 27 17:38:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2573: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46394 at Tue Nov 27 17:38:37 PST 2012
kill -USR1 46394
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46394 killed at Tue Nov 27 17:38:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:38:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46442 >/dev/null 2>/dev/null
selfserv with PID 46442 found at Tue Nov 27 17:38:37 PST 2012
selfserv with PID 46442 started at Tue Nov 27 17:38:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46442 at Tue Nov 27 17:38:38 PST 2012
kill -USR1 46442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46442 killed at Tue Nov 27 17:38:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46490 >/dev/null 2>/dev/null
selfserv with PID 46490 found at Tue Nov 27 17:38:38 PST 2012
selfserv with PID 46490 started at Tue Nov 27 17:38:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46490 at Tue Nov 27 17:38:38 PST 2012
kill -USR1 46490
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46490 killed at Tue Nov 27 17:38:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:38:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46538 >/dev/null 2>/dev/null
selfserv with PID 46538 found at Tue Nov 27 17:38:38 PST 2012
selfserv with PID 46538 started at Tue Nov 27 17:38:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46538 at Tue Nov 27 17:38:38 PST 2012
kill -USR1 46538
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46538 killed at Tue Nov 27 17:38:38 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:38:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46586 >/dev/null 2>/dev/null
selfserv with PID 46586 found at Tue Nov 27 17:38:39 PST 2012
selfserv with PID 46586 started at Tue Nov 27 17:38:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46586 at Tue Nov 27 17:38:39 PST 2012
kill -USR1 46586
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46586 killed at Tue Nov 27 17:38:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46634 >/dev/null 2>/dev/null
selfserv with PID 46634 found at Tue Nov 27 17:38:39 PST 2012
selfserv with PID 46634 started at Tue Nov 27 17:38:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2578: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46634 at Tue Nov 27 17:38:39 PST 2012
kill -USR1 46634
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46634 killed at Tue Nov 27 17:38:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:38:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46682 >/dev/null 2>/dev/null
selfserv with PID 46682 found at Tue Nov 27 17:38:39 PST 2012
selfserv with PID 46682 started at Tue Nov 27 17:38:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2579: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46682 at Tue Nov 27 17:38:40 PST 2012
kill -USR1 46682
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46682 killed at Tue Nov 27 17:38:40 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:38:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46730 >/dev/null 2>/dev/null
selfserv with PID 46730 found at Tue Nov 27 17:38:40 PST 2012
selfserv with PID 46730 started at Tue Nov 27 17:38:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46730 at Tue Nov 27 17:38:40 PST 2012
kill -USR1 46730
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46730 killed at Tue Nov 27 17:38:40 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46778 >/dev/null 2>/dev/null
selfserv with PID 46778 found at Tue Nov 27 17:38:40 PST 2012
selfserv with PID 46778 started at Tue Nov 27 17:38:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46778 at Tue Nov 27 17:38:40 PST 2012
kill -USR1 46778
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46778 killed at Tue Nov 27 17:38:40 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:38:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46826 >/dev/null 2>/dev/null
selfserv with PID 46826 found at Tue Nov 27 17:38:40 PST 2012
selfserv with PID 46826 started at Tue Nov 27 17:38:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46826 at Tue Nov 27 17:38:41 PST 2012
kill -USR1 46826
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46826 killed at Tue Nov 27 17:38:41 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:38:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46874 >/dev/null 2>/dev/null
selfserv with PID 46874 found at Tue Nov 27 17:38:41 PST 2012
selfserv with PID 46874 started at Tue Nov 27 17:38:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 46874 at Tue Nov 27 17:38:41 PST 2012
kill -USR1 46874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46874 killed at Tue Nov 27 17:38:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:38:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46922 >/dev/null 2>/dev/null
selfserv with PID 46922 found at Tue Nov 27 17:38:41 PST 2012
selfserv with PID 46922 started at Tue Nov 27 17:38:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2584: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46922 at Tue Nov 27 17:38:41 PST 2012
kill -USR1 46922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46922 killed at Tue Nov 27 17:38:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:38:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 46970 >/dev/null 2>/dev/null
selfserv with PID 46970 found at Tue Nov 27 17:38:41 PST 2012
selfserv with PID 46970 started at Tue Nov 27 17:38:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2585: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 46970 at Tue Nov 27 17:38:42 PST 2012
kill -USR1 46970
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 46970 killed at Tue Nov 27 17:38:42 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:38:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47018 >/dev/null 2>/dev/null
selfserv with PID 47018 found at Tue Nov 27 17:38:42 PST 2012
selfserv with PID 47018 started at Tue Nov 27 17:38:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47018 at Tue Nov 27 17:38:42 PST 2012
kill -USR1 47018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47018 killed at Tue Nov 27 17:38:42 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47081 >/dev/null 2>/dev/null
selfserv with PID 47081 found at Tue Nov 27 17:38:42 PST 2012
selfserv with PID 47081 started at Tue Nov 27 17:38:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47081 at Tue Nov 27 17:38:43 PST 2012
kill -USR1 47081
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47081 killed at Tue Nov 27 17:38:43 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47129 >/dev/null 2>/dev/null
selfserv with PID 47129 found at Tue Nov 27 17:38:43 PST 2012
selfserv with PID 47129 started at Tue Nov 27 17:38:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47129 at Tue Nov 27 17:38:43 PST 2012
kill -USR1 47129
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47129 killed at Tue Nov 27 17:38:43 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47177 >/dev/null 2>/dev/null
selfserv with PID 47177 found at Tue Nov 27 17:38:43 PST 2012
selfserv with PID 47177 started at Tue Nov 27 17:38:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2589: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 47177 at Tue Nov 27 17:38:43 PST 2012
kill -USR1 47177
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47177 killed at Tue Nov 27 17:38:43 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47225 >/dev/null 2>/dev/null
selfserv with PID 47225 found at Tue Nov 27 17:38:43 PST 2012
selfserv with PID 47225 started at Tue Nov 27 17:38:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2590: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47225 at Tue Nov 27 17:38:44 PST 2012
kill -USR1 47225
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47225 killed at Tue Nov 27 17:38:44 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47273 >/dev/null 2>/dev/null
selfserv with PID 47273 found at Tue Nov 27 17:38:44 PST 2012
selfserv with PID 47273 started at Tue Nov 27 17:38:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2591: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47273 at Tue Nov 27 17:38:44 PST 2012
kill -USR1 47273
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47273 killed at Tue Nov 27 17:38:44 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47321 >/dev/null 2>/dev/null
selfserv with PID 47321 found at Tue Nov 27 17:38:44 PST 2012
selfserv with PID 47321 started at Tue Nov 27 17:38:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2592: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47321 at Tue Nov 27 17:38:44 PST 2012
kill -USR1 47321
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47321 killed at Tue Nov 27 17:38:44 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47369 >/dev/null 2>/dev/null
selfserv with PID 47369 found at Tue Nov 27 17:38:45 PST 2012
selfserv with PID 47369 started at Tue Nov 27 17:38:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2593: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 47369 at Tue Nov 27 17:38:45 PST 2012
kill -USR1 47369
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47369 killed at Tue Nov 27 17:38:45 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47417 >/dev/null 2>/dev/null
selfserv with PID 47417 found at Tue Nov 27 17:38:45 PST 2012
selfserv with PID 47417 started at Tue Nov 27 17:38:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47417 at Tue Nov 27 17:38:45 PST 2012
kill -USR1 47417
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47417 killed at Tue Nov 27 17:38:45 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47465 >/dev/null 2>/dev/null
selfserv with PID 47465 found at Tue Nov 27 17:38:45 PST 2012
selfserv with PID 47465 started at Tue Nov 27 17:38:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47465 at Tue Nov 27 17:38:46 PST 2012
kill -USR1 47465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47465 killed at Tue Nov 27 17:38:46 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47523 >/dev/null 2>/dev/null
selfserv with PID 47523 found at Tue Nov 27 17:38:46 PST 2012
selfserv with PID 47523 started at Tue Nov 27 17:38:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2596: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47523 at Tue Nov 27 17:38:46 PST 2012
kill -USR1 47523
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47523 killed at Tue Nov 27 17:38:46 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47571 >/dev/null 2>/dev/null
selfserv with PID 47571 found at Tue Nov 27 17:38:46 PST 2012
selfserv with PID 47571 started at Tue Nov 27 17:38:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2597: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 47571 at Tue Nov 27 17:38:46 PST 2012
kill -USR1 47571
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47571 killed at Tue Nov 27 17:38:46 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47619 >/dev/null 2>/dev/null
selfserv with PID 47619 found at Tue Nov 27 17:38:46 PST 2012
selfserv with PID 47619 started at Tue Nov 27 17:38:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2598: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47619 at Tue Nov 27 17:38:47 PST 2012
kill -USR1 47619
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47619 killed at Tue Nov 27 17:38:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47667 >/dev/null 2>/dev/null
selfserv with PID 47667 found at Tue Nov 27 17:38:47 PST 2012
selfserv with PID 47667 started at Tue Nov 27 17:38:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47667 at Tue Nov 27 17:38:47 PST 2012
kill -USR1 47667
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47667 killed at Tue Nov 27 17:38:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47715 >/dev/null 2>/dev/null
selfserv with PID 47715 found at Tue Nov 27 17:38:47 PST 2012
selfserv with PID 47715 started at Tue Nov 27 17:38:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47715 at Tue Nov 27 17:38:48 PST 2012
kill -USR1 47715
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47715 killed at Tue Nov 27 17:38:48 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47763 >/dev/null 2>/dev/null
selfserv with PID 47763 found at Tue Nov 27 17:38:48 PST 2012
selfserv with PID 47763 started at Tue Nov 27 17:38:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2601: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 47763 at Tue Nov 27 17:38:48 PST 2012
kill -USR1 47763
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47763 killed at Tue Nov 27 17:38:48 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47811 >/dev/null 2>/dev/null
selfserv with PID 47811 found at Tue Nov 27 17:38:48 PST 2012
selfserv with PID 47811 started at Tue Nov 27 17:38:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47811 at Tue Nov 27 17:38:48 PST 2012
kill -USR1 47811
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47811 killed at Tue Nov 27 17:38:48 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47859 >/dev/null 2>/dev/null
selfserv with PID 47859 found at Tue Nov 27 17:38:48 PST 2012
selfserv with PID 47859 started at Tue Nov 27 17:38:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2603: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47859 at Tue Nov 27 17:38:49 PST 2012
kill -USR1 47859
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47859 killed at Tue Nov 27 17:38:49 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47907 >/dev/null 2>/dev/null
selfserv with PID 47907 found at Tue Nov 27 17:38:49 PST 2012
selfserv with PID 47907 started at Tue Nov 27 17:38:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2604: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 47907 at Tue Nov 27 17:38:49 PST 2012
kill -USR1 47907
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47907 killed at Tue Nov 27 17:38:49 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:38:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 47955 >/dev/null 2>/dev/null
selfserv with PID 47955 found at Tue Nov 27 17:38:49 PST 2012
selfserv with PID 47955 started at Tue Nov 27 17:38:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2605: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 47955 at Tue Nov 27 17:38:49 PST 2012
kill -USR1 47955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 47955 killed at Tue Nov 27 17:38:49 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:38:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48003 >/dev/null 2>/dev/null
selfserv with PID 48003 found at Tue Nov 27 17:38:50 PST 2012
selfserv with PID 48003 started at Tue Nov 27 17:38:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 48003 at Tue Nov 27 17:38:50 PST 2012
kill -USR1 48003
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48003 killed at Tue Nov 27 17:38:50 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:38:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48072 >/dev/null 2>/dev/null
selfserv with PID 48072 found at Tue Nov 27 17:38:50 PST 2012
selfserv with PID 48072 started at Tue Nov 27 17:38:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 48072 at Tue Nov 27 17:38:50 PST 2012
kill -USR1 48072
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48072 killed at Tue Nov 27 17:38:50 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:38:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48126 >/dev/null 2>/dev/null
selfserv with PID 48126 found at Tue Nov 27 17:38:50 PST 2012
selfserv with PID 48126 started at Tue Nov 27 17:38:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 48126 at Tue Nov 27 17:38:51 PST 2012
kill -USR1 48126
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48126 killed at Tue Nov 27 17:38:51 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:38:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48180 >/dev/null 2>/dev/null
selfserv with PID 48180 found at Tue Nov 27 17:38:51 PST 2012
selfserv with PID 48180 started at Tue Nov 27 17:38:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2609: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 48180 at Tue Nov 27 17:38:51 PST 2012
kill -USR1 48180
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48180 killed at Tue Nov 27 17:38:51 PST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:38:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48234 >/dev/null 2>/dev/null
selfserv with PID 48234 found at Tue Nov 27 17:38:51 PST 2012
selfserv with PID 48234 started at Tue Nov 27 17:38:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2610: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 48234 at Tue Nov 27 17:38:51 PST 2012
kill -USR1 48234
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48234 killed at Tue Nov 27 17:38:51 PST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 17:38:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48288 >/dev/null 2>/dev/null
selfserv with PID 48288 found at Tue Nov 27 17:38:52 PST 2012
selfserv with PID 48288 started at Tue Nov 27 17:38:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2611: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 48288 at Tue Nov 27 17:38:52 PST 2012
kill -USR1 48288
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48288 killed at Tue Nov 27 17:38:52 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:38:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48342 >/dev/null 2>/dev/null
selfserv with PID 48342 found at Tue Nov 27 17:38:52 PST 2012
selfserv with PID 48342 started at Tue Nov 27 17:38:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 48342 at Tue Nov 27 17:38:52 PST 2012
kill -USR1 48342
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48342 killed at Tue Nov 27 17:38:52 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:38:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48396 >/dev/null 2>/dev/null
selfserv with PID 48396 found at Tue Nov 27 17:38:52 PST 2012
selfserv with PID 48396 started at Tue Nov 27 17:38:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2613: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 48396 at Tue Nov 27 17:38:53 PST 2012
kill -USR1 48396
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48396 killed at Tue Nov 27 17:38:53 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 17:38:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48450 >/dev/null 2>/dev/null
selfserv with PID 48450 found at Tue Nov 27 17:38:53 PST 2012
selfserv with PID 48450 started at Tue Nov 27 17:38:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2614: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 48450 at Tue Nov 27 17:38:53 PST 2012
kill -USR1 48450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48450 killed at Tue Nov 27 17:38:53 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 17:38:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48504 >/dev/null 2>/dev/null
selfserv with PID 48504 found at Tue Nov 27 17:38:53 PST 2012
selfserv with PID 48504 started at Tue Nov 27 17:38:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2615: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 48504 at Tue Nov 27 17:38:53 PST 2012
kill -USR1 48504
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48504 killed at Tue Nov 27 17:38:53 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:38:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48558 >/dev/null 2>/dev/null
selfserv with PID 48558 found at Tue Nov 27 17:38:53 PST 2012
selfserv with PID 48558 started at Tue Nov 27 17:38:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2616: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 48558 at Tue Nov 27 17:38:54 PST 2012
kill -USR1 48558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48558 killed at Tue Nov 27 17:38:54 PST 2012
ssl.sh: SSL Stress Test  - server fips/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:38:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48685 >/dev/null 2>/dev/null
selfserv with PID 48685 found at Tue Nov 27 17:38:54 PST 2012
selfserv with PID 48685 started at Tue Nov 27 17:38:54 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:55 PST 2012
ssl.sh: #2617: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 48685 at Tue Nov 27 17:38:55 PST 2012
kill -USR1 48685
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48685 killed at Tue Nov 27 17:38:55 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:38:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48743 >/dev/null 2>/dev/null
selfserv with PID 48743 found at Tue Nov 27 17:38:55 PST 2012
selfserv with PID 48743 started at Tue Nov 27 17:38:55 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:56 PST 2012
ssl.sh: #2618: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 48743 at Tue Nov 27 17:38:56 PST 2012
kill -USR1 48743
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48743 killed at Tue Nov 27 17:38:56 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:38:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48801 >/dev/null 2>/dev/null
selfserv with PID 48801 found at Tue Nov 27 17:38:57 PST 2012
selfserv with PID 48801 started at Tue Nov 27 17:38:57 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:57 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:38:58 PST 2012
ssl.sh: #2619: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 48801 at Tue Nov 27 17:38:58 PST 2012
kill -USR1 48801
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48801 killed at Tue Nov 27 17:38:58 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:38:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48859 >/dev/null 2>/dev/null
selfserv with PID 48859 found at Tue Nov 27 17:38:58 PST 2012
selfserv with PID 48859 started at Tue Nov 27 17:38:58 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:58 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:38:59 PST 2012
ssl.sh: #2620: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 48859 at Tue Nov 27 17:38:59 PST 2012
kill -USR1 48859
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48859 killed at Tue Nov 27 17:38:59 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:38:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:38:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48917 >/dev/null 2>/dev/null
selfserv with PID 48917 found at Tue Nov 27 17:38:59 PST 2012
selfserv with PID 48917 started at Tue Nov 27 17:38:59 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:38:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:01 PST 2012
ssl.sh: #2621: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 48917 at Tue Nov 27 17:39:01 PST 2012
kill -USR1 48917
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48917 killed at Tue Nov 27 17:39:01 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:39:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 48975 >/dev/null 2>/dev/null
selfserv with PID 48975 found at Tue Nov 27 17:39:01 PST 2012
selfserv with PID 48975 started at Tue Nov 27 17:39:01 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:39:02 PST 2012
ssl.sh: #2622: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 48975 at Tue Nov 27 17:39:02 PST 2012
kill -USR1 48975
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 48975 killed at Tue Nov 27 17:39:02 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:39:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49033 >/dev/null 2>/dev/null
selfserv with PID 49033 found at Tue Nov 27 17:39:03 PST 2012
selfserv with PID 49033 started at Tue Nov 27 17:39:03 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:39:04 PST 2012
ssl.sh: #2623: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49033 at Tue Nov 27 17:39:04 PST 2012
kill -USR1 49033
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49033 killed at Tue Nov 27 17:39:04 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 17:39:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49097 >/dev/null 2>/dev/null
selfserv with PID 49097 found at Tue Nov 27 17:39:04 PST 2012
selfserv with PID 49097 started at Tue Nov 27 17:39:04 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:04 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:39:06 PST 2012
ssl.sh: #2624: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49097 at Tue Nov 27 17:39:06 PST 2012
kill -USR1 49097
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49097 killed at Tue Nov 27 17:39:06 PST 2012
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:39:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49180 >/dev/null 2>/dev/null
selfserv with PID 49180 found at Tue Nov 27 17:39:06 PST 2012
selfserv with PID 49180 started at Tue Nov 27 17:39:06 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:06 PST 2012
ssl.sh: #2625: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49180 at Tue Nov 27 17:39:06 PST 2012
kill -USR1 49180
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49180 killed at Tue Nov 27 17:39:06 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:39:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49238 >/dev/null 2>/dev/null
selfserv with PID 49238 found at Tue Nov 27 17:39:07 PST 2012
selfserv with PID 49238 started at Tue Nov 27 17:39:07 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:07 PST 2012
ssl.sh: #2626: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49238 at Tue Nov 27 17:39:07 PST 2012
kill -USR1 49238
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49238 killed at Tue Nov 27 17:39:07 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:39:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49296 >/dev/null 2>/dev/null
selfserv with PID 49296 found at Tue Nov 27 17:39:07 PST 2012
selfserv with PID 49296 started at Tue Nov 27 17:39:07 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:39:08 PST 2012
ssl.sh: #2627: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49296 at Tue Nov 27 17:39:08 PST 2012
kill -USR1 49296
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49296 killed at Tue Nov 27 17:39:08 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:39:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49354 >/dev/null 2>/dev/null
selfserv with PID 49354 found at Tue Nov 27 17:39:08 PST 2012
selfserv with PID 49354 started at Tue Nov 27 17:39:08 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:08 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:08 PST 2012
ssl.sh: #2628: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49354 at Tue Nov 27 17:39:08 PST 2012
kill -USR1 49354
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49354 killed at Tue Nov 27 17:39:08 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:39:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49412 >/dev/null 2>/dev/null
selfserv with PID 49412 found at Tue Nov 27 17:39:09 PST 2012
selfserv with PID 49412 started at Tue Nov 27 17:39:09 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:09 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:09 PST 2012
ssl.sh: #2629: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49412 at Tue Nov 27 17:39:09 PST 2012
kill -USR1 49412
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49412 killed at Tue Nov 27 17:39:09 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:39:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49470 >/dev/null 2>/dev/null
selfserv with PID 49470 found at Tue Nov 27 17:39:09 PST 2012
selfserv with PID 49470 started at Tue Nov 27 17:39:09 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:09 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:39:09 PST 2012
ssl.sh: #2630: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49470 at Tue Nov 27 17:39:09 PST 2012
kill -USR1 49470
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49470 killed at Tue Nov 27 17:39:09 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:39:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49528 >/dev/null 2>/dev/null
selfserv with PID 49528 found at Tue Nov 27 17:39:10 PST 2012
selfserv with PID 49528 started at Tue Nov 27 17:39:10 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:39:10 PST 2012
ssl.sh: #2631: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49528 at Tue Nov 27 17:39:10 PST 2012
kill -USR1 49528
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49528 killed at Tue Nov 27 17:39:10 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 17:39:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49592 >/dev/null 2>/dev/null
selfserv with PID 49592 found at Tue Nov 27 17:39:10 PST 2012
selfserv with PID 49592 started at Tue Nov 27 17:39:10 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:39:12 PST 2012
ssl.sh: #2632: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49592 at Tue Nov 27 17:39:12 PST 2012
kill -USR1 49592
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49592 killed at Tue Nov 27 17:39:12 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 17:39:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49656 >/dev/null 2>/dev/null
selfserv with PID 49656 found at Tue Nov 27 17:39:12 PST 2012
selfserv with PID 49656 started at Tue Nov 27 17:39:12 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:39:15 PST 2012
ssl.sh: #2633: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49656 at Tue Nov 27 17:39:15 PST 2012
kill -USR1 49656
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49656 killed at Tue Nov 27 17:39:15 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:39:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49735 >/dev/null 2>/dev/null
selfserv with PID 49735 found at Tue Nov 27 17:39:15 PST 2012
selfserv with PID 49735 started at Tue Nov 27 17:39:15 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:17 PST 2012
ssl.sh: #2634: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49735 at Tue Nov 27 17:39:17 PST 2012
kill -USR1 49735
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49735 killed at Tue Nov 27 17:39:17 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:39:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49793 >/dev/null 2>/dev/null
selfserv with PID 49793 found at Tue Nov 27 17:39:17 PST 2012
selfserv with PID 49793 started at Tue Nov 27 17:39:17 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:18 PST 2012
ssl.sh: #2635: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49793 at Tue Nov 27 17:39:18 PST 2012
kill -USR1 49793
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49793 killed at Tue Nov 27 17:39:18 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:39:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49853 >/dev/null 2>/dev/null
selfserv with PID 49853 found at Tue Nov 27 17:39:18 PST 2012
selfserv with PID 49853 started at Tue Nov 27 17:39:19 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:21 PST 2012
ssl.sh: #2636: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49853 at Tue Nov 27 17:39:21 PST 2012
kill -USR1 49853
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49853 killed at Tue Nov 27 17:39:21 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:39:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49911 >/dev/null 2>/dev/null
selfserv with PID 49911 found at Tue Nov 27 17:39:21 PST 2012
selfserv with PID 49911 started at Tue Nov 27 17:39:21 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:21 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:22 PST 2012
ssl.sh: #2637: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49911 at Tue Nov 27 17:39:23 PST 2012
kill -USR1 49911
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49911 killed at Tue Nov 27 17:39:23 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:39:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 49969 >/dev/null 2>/dev/null
selfserv with PID 49969 found at Tue Nov 27 17:39:23 PST 2012
selfserv with PID 49969 started at Tue Nov 27 17:39:23 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:23 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:24 PST 2012
ssl.sh: #2638: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 49969 at Tue Nov 27 17:39:24 PST 2012
kill -USR1 49969
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 49969 killed at Tue Nov 27 17:39:24 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:39:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50027 >/dev/null 2>/dev/null
selfserv with PID 50027 found at Tue Nov 27 17:39:24 PST 2012
selfserv with PID 50027 started at Tue Nov 27 17:39:24 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:24 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:39:26 PST 2012
ssl.sh: #2639: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50027 at Tue Nov 27 17:39:26 PST 2012
kill -USR1 50027
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50027 killed at Tue Nov 27 17:39:26 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:39:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50106 >/dev/null 2>/dev/null
selfserv with PID 50106 found at Tue Nov 27 17:39:26 PST 2012
selfserv with PID 50106 started at Tue Nov 27 17:39:26 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:26 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:26 PST 2012
ssl.sh: #2640: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50106 at Tue Nov 27 17:39:26 PST 2012
kill -USR1 50106
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50106 killed at Tue Nov 27 17:39:26 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:39:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50164 >/dev/null 2>/dev/null
selfserv with PID 50164 found at Tue Nov 27 17:39:27 PST 2012
selfserv with PID 50164 started at Tue Nov 27 17:39:27 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:27 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:27 PST 2012
ssl.sh: #2641: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50164 at Tue Nov 27 17:39:27 PST 2012
kill -USR1 50164
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50164 killed at Tue Nov 27 17:39:27 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:39:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50222 >/dev/null 2>/dev/null
selfserv with PID 50222 found at Tue Nov 27 17:39:27 PST 2012
selfserv with PID 50222 started at Tue Nov 27 17:39:27 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:27 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:28 PST 2012
ssl.sh: #2642: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50222 at Tue Nov 27 17:39:28 PST 2012
kill -USR1 50222
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50222 killed at Tue Nov 27 17:39:28 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:39:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50280 >/dev/null 2>/dev/null
selfserv with PID 50280 found at Tue Nov 27 17:39:28 PST 2012
selfserv with PID 50280 started at Tue Nov 27 17:39:28 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:28 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:39:28 PST 2012
ssl.sh: #2643: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50280 at Tue Nov 27 17:39:28 PST 2012
kill -USR1 50280
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50280 killed at Tue Nov 27 17:39:28 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:39:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50338 >/dev/null 2>/dev/null
selfserv with PID 50338 found at Tue Nov 27 17:39:29 PST 2012
selfserv with PID 50338 started at Tue Nov 27 17:39:29 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:39:29 PST 2012
ssl.sh: #2644: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50338 at Tue Nov 27 17:39:29 PST 2012
kill -USR1 50338
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50338 killed at Tue Nov 27 17:39:29 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:39:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50396 >/dev/null 2>/dev/null
selfserv with PID 50396 found at Tue Nov 27 17:39:29 PST 2012
selfserv with PID 50396 started at Tue Nov 27 17:39:29 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:39:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:39:30 PST 2012
ssl.sh: #2645: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 50396 at Tue Nov 27 17:39:30 PST 2012
kill -USR1 50396
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50396 killed at Tue Nov 27 17:39:30 PST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 17:39:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:30 PST 2012
selfserv with PID 50441 started at Tue Nov 27 17:39:30 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2646: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2647: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2648: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2649: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2650: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2651: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2652: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2653: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2654: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2655: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2656: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2657: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2658: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2659: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2660: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2661: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2662: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2663: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2664: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2665: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2666: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2667: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2668: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2669: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2670: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2671: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2672: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2673: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2674: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2675: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2676: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2677: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2678: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2679: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2680: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2681: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2682: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2683: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2684: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 50441 >/dev/null 2>/dev/null
selfserv with PID 50441 found at Tue Nov 27 17:39:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2685: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 50441 at Tue Nov 27 17:39:36 PST 2012
kill -USR1 50441
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 50441 killed at Tue Nov 27 17:39:36 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:39:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 51655 >/dev/null 2>/dev/null
selfserv with PID 51655 found at Tue Nov 27 17:39:36 PST 2012
selfserv with PID 51655 started at Tue Nov 27 17:39:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2686: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 51655 >/dev/null 2>/dev/null
selfserv with PID 51655 found at Tue Nov 27 17:39:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 51655 >/dev/null 2>/dev/null
selfserv with PID 51655 found at Tue Nov 27 17:39:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 51655 >/dev/null 2>/dev/null
selfserv with PID 51655 found at Tue Nov 27 17:39:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 51655 >/dev/null 2>/dev/null
selfserv with PID 51655 found at Tue Nov 27 17:39:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 51655 at Tue Nov 27 17:39:37 PST 2012
kill -USR1 51655
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 51655 killed at Tue Nov 27 17:39:37 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:39:37 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:37 PST 2012
selfserv with PID 51794 started at Tue Nov 27 17:39:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 51794 >/dev/null 2>/dev/null
selfserv with PID 51794 found at Tue Nov 27 17:39:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 51794 at Tue Nov 27 17:39:40 PST 2012
kill -USR1 51794
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 51794 killed at Tue Nov 27 17:39:40 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:39:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52185 >/dev/null 2>/dev/null
selfserv with PID 52185 found at Tue Nov 27 17:39:40 PST 2012
selfserv with PID 52185 started at Tue Nov 27 17:39:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 52185 >/dev/null 2>/dev/null
selfserv with PID 52185 found at Tue Nov 27 17:39:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 52185 >/dev/null 2>/dev/null
selfserv with PID 52185 found at Tue Nov 27 17:39:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 52185 >/dev/null 2>/dev/null
selfserv with PID 52185 found at Tue Nov 27 17:39:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 52185 >/dev/null 2>/dev/null
selfserv with PID 52185 found at Tue Nov 27 17:39:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 52185 at Tue Nov 27 17:39:41 PST 2012
kill -USR1 52185
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52185 killed at Tue Nov 27 17:39:41 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:39:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:41 PST 2012
selfserv with PID 52324 started at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 52324 >/dev/null 2>/dev/null
selfserv with PID 52324 found at Tue Nov 27 17:39:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 52324 at Tue Nov 27 17:39:43 PST 2012
kill -USR1 52324
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52324 killed at Tue Nov 27 17:39:43 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:39:43 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52701 >/dev/null 2>/dev/null
selfserv with PID 52701 found at Tue Nov 27 17:39:43 PST 2012
selfserv with PID 52701 started at Tue Nov 27 17:39:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 52701 >/dev/null 2>/dev/null
selfserv with PID 52701 found at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 52701 >/dev/null 2>/dev/null
selfserv with PID 52701 found at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 52701 >/dev/null 2>/dev/null
selfserv with PID 52701 found at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 52701 >/dev/null 2>/dev/null
selfserv with PID 52701 found at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 52701 at Tue Nov 27 17:39:44 PST 2012
kill -USR1 52701
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52701 killed at Tue Nov 27 17:39:44 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:39:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52840 >/dev/null 2>/dev/null
selfserv with PID 52840 found at Tue Nov 27 17:39:44 PST 2012
selfserv with PID 52840 started at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 52840 >/dev/null 2>/dev/null
selfserv with PID 52840 found at Tue Nov 27 17:39:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 52840 >/dev/null 2>/dev/null
selfserv with PID 52840 found at Tue Nov 27 17:39:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 52840 >/dev/null 2>/dev/null
selfserv with PID 52840 found at Tue Nov 27 17:39:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 52840 >/dev/null 2>/dev/null
selfserv with PID 52840 found at Tue Nov 27 17:39:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 52840 at Tue Nov 27 17:39:45 PST 2012
kill -USR1 52840
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52840 killed at Tue Nov 27 17:39:45 PST 2012
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53030 >/dev/null 2>/dev/null
selfserv with PID 53030 found at Tue Nov 27 17:39:45 PST 2012
selfserv with PID 53030 started at Tue Nov 27 17:39:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53030 at Tue Nov 27 17:39:45 PST 2012
kill -USR1 53030
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53030 killed at Tue Nov 27 17:39:45 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:39:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53085 >/dev/null 2>/dev/null
selfserv with PID 53085 found at Tue Nov 27 17:39:46 PST 2012
selfserv with PID 53085 started at Tue Nov 27 17:39:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53085 at Tue Nov 27 17:39:46 PST 2012
kill -USR1 53085
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53085 killed at Tue Nov 27 17:39:46 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:39:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53136 >/dev/null 2>/dev/null
selfserv with PID 53136 found at Tue Nov 27 17:39:46 PST 2012
selfserv with PID 53136 started at Tue Nov 27 17:39:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53136 at Tue Nov 27 17:39:46 PST 2012
kill -USR1 53136
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53136 killed at Tue Nov 27 17:39:46 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53184 >/dev/null 2>/dev/null
selfserv with PID 53184 found at Tue Nov 27 17:39:46 PST 2012
selfserv with PID 53184 started at Tue Nov 27 17:39:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2739: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 53184 at Tue Nov 27 17:39:47 PST 2012
kill -USR1 53184
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53184 killed at Tue Nov 27 17:39:47 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:39:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53232 >/dev/null 2>/dev/null
selfserv with PID 53232 found at Tue Nov 27 17:39:47 PST 2012
selfserv with PID 53232 started at Tue Nov 27 17:39:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2740: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 53232 at Tue Nov 27 17:39:47 PST 2012
kill -USR1 53232
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53232 killed at Tue Nov 27 17:39:47 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:39:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53280 >/dev/null 2>/dev/null
selfserv with PID 53280 found at Tue Nov 27 17:39:47 PST 2012
selfserv with PID 53280 started at Tue Nov 27 17:39:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53280 at Tue Nov 27 17:39:47 PST 2012
kill -USR1 53280
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53280 killed at Tue Nov 27 17:39:47 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53328 >/dev/null 2>/dev/null
selfserv with PID 53328 found at Tue Nov 27 17:39:47 PST 2012
selfserv with PID 53328 started at Tue Nov 27 17:39:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53328 at Tue Nov 27 17:39:48 PST 2012
kill -USR1 53328
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53328 killed at Tue Nov 27 17:39:48 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:39:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53376 >/dev/null 2>/dev/null
selfserv with PID 53376 found at Tue Nov 27 17:39:48 PST 2012
selfserv with PID 53376 started at Tue Nov 27 17:39:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53376 at Tue Nov 27 17:39:48 PST 2012
kill -USR1 53376
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53376 killed at Tue Nov 27 17:39:48 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:39:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53424 >/dev/null 2>/dev/null
selfserv with PID 53424 found at Tue Nov 27 17:39:48 PST 2012
selfserv with PID 53424 started at Tue Nov 27 17:39:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53424 at Tue Nov 27 17:39:48 PST 2012
kill -USR1 53424
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53424 killed at Tue Nov 27 17:39:48 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53472 >/dev/null 2>/dev/null
selfserv with PID 53472 found at Tue Nov 27 17:39:48 PST 2012
selfserv with PID 53472 started at Tue Nov 27 17:39:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2745: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 53472 at Tue Nov 27 17:39:49 PST 2012
kill -USR1 53472
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53472 killed at Tue Nov 27 17:39:49 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:39:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53520 >/dev/null 2>/dev/null
selfserv with PID 53520 found at Tue Nov 27 17:39:49 PST 2012
selfserv with PID 53520 started at Tue Nov 27 17:39:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2746: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 53520 at Tue Nov 27 17:39:49 PST 2012
kill -USR1 53520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53520 killed at Tue Nov 27 17:39:49 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:39:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53568 >/dev/null 2>/dev/null
selfserv with PID 53568 found at Tue Nov 27 17:39:49 PST 2012
selfserv with PID 53568 started at Tue Nov 27 17:39:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53568 at Tue Nov 27 17:39:50 PST 2012
kill -USR1 53568
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53568 killed at Tue Nov 27 17:39:50 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53616 >/dev/null 2>/dev/null
selfserv with PID 53616 found at Tue Nov 27 17:39:50 PST 2012
selfserv with PID 53616 started at Tue Nov 27 17:39:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53616 at Tue Nov 27 17:39:50 PST 2012
kill -USR1 53616
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53616 killed at Tue Nov 27 17:39:50 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:39:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53664 >/dev/null 2>/dev/null
selfserv with PID 53664 found at Tue Nov 27 17:39:50 PST 2012
selfserv with PID 53664 started at Tue Nov 27 17:39:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53664 at Tue Nov 27 17:39:50 PST 2012
kill -USR1 53664
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53664 killed at Tue Nov 27 17:39:50 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:39:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53712 >/dev/null 2>/dev/null
selfserv with PID 53712 found at Tue Nov 27 17:39:50 PST 2012
selfserv with PID 53712 started at Tue Nov 27 17:39:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53712 at Tue Nov 27 17:39:51 PST 2012
kill -USR1 53712
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53712 killed at Tue Nov 27 17:39:51 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53760 >/dev/null 2>/dev/null
selfserv with PID 53760 found at Tue Nov 27 17:39:51 PST 2012
selfserv with PID 53760 started at Tue Nov 27 17:39:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2751: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 53760 at Tue Nov 27 17:39:51 PST 2012
kill -USR1 53760
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53760 killed at Tue Nov 27 17:39:51 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:39:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53808 >/dev/null 2>/dev/null
selfserv with PID 53808 found at Tue Nov 27 17:39:51 PST 2012
selfserv with PID 53808 started at Tue Nov 27 17:39:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2752: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 53808 at Tue Nov 27 17:39:51 PST 2012
kill -USR1 53808
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53808 killed at Tue Nov 27 17:39:51 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:39:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53856 >/dev/null 2>/dev/null
selfserv with PID 53856 found at Tue Nov 27 17:39:52 PST 2012
selfserv with PID 53856 started at Tue Nov 27 17:39:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53856 at Tue Nov 27 17:39:52 PST 2012
kill -USR1 53856
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53856 killed at Tue Nov 27 17:39:52 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:52 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53904 >/dev/null 2>/dev/null
selfserv with PID 53904 found at Tue Nov 27 17:39:52 PST 2012
selfserv with PID 53904 started at Tue Nov 27 17:39:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53904 at Tue Nov 27 17:39:52 PST 2012
kill -USR1 53904
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53904 killed at Tue Nov 27 17:39:52 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:39:52 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53952 >/dev/null 2>/dev/null
selfserv with PID 53952 found at Tue Nov 27 17:39:52 PST 2012
selfserv with PID 53952 started at Tue Nov 27 17:39:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53952 at Tue Nov 27 17:39:53 PST 2012
kill -USR1 53952
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53952 killed at Tue Nov 27 17:39:53 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:39:53 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54000 >/dev/null 2>/dev/null
selfserv with PID 54000 found at Tue Nov 27 17:39:53 PST 2012
selfserv with PID 54000 started at Tue Nov 27 17:39:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54000 at Tue Nov 27 17:39:53 PST 2012
kill -USR1 54000
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54000 killed at Tue Nov 27 17:39:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:53 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54048 >/dev/null 2>/dev/null
selfserv with PID 54048 found at Tue Nov 27 17:39:53 PST 2012
selfserv with PID 54048 started at Tue Nov 27 17:39:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2757: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54048 at Tue Nov 27 17:39:53 PST 2012
kill -USR1 54048
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54048 killed at Tue Nov 27 17:39:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:39:53 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54096 >/dev/null 2>/dev/null
selfserv with PID 54096 found at Tue Nov 27 17:39:53 PST 2012
selfserv with PID 54096 started at Tue Nov 27 17:39:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2758: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54096 at Tue Nov 27 17:39:54 PST 2012
kill -USR1 54096
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54096 killed at Tue Nov 27 17:39:54 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:39:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54144 >/dev/null 2>/dev/null
selfserv with PID 54144 found at Tue Nov 27 17:39:54 PST 2012
selfserv with PID 54144 started at Tue Nov 27 17:39:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54144 at Tue Nov 27 17:39:54 PST 2012
kill -USR1 54144
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54144 killed at Tue Nov 27 17:39:54 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54192 >/dev/null 2>/dev/null
selfserv with PID 54192 found at Tue Nov 27 17:39:54 PST 2012
selfserv with PID 54192 started at Tue Nov 27 17:39:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54192 at Tue Nov 27 17:39:54 PST 2012
kill -USR1 54192
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54192 killed at Tue Nov 27 17:39:54 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:39:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54240 >/dev/null 2>/dev/null
selfserv with PID 54240 found at Tue Nov 27 17:39:55 PST 2012
selfserv with PID 54240 started at Tue Nov 27 17:39:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54240 at Tue Nov 27 17:39:55 PST 2012
kill -USR1 54240
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54240 killed at Tue Nov 27 17:39:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:39:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54288 >/dev/null 2>/dev/null
selfserv with PID 54288 found at Tue Nov 27 17:39:55 PST 2012
selfserv with PID 54288 started at Tue Nov 27 17:39:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54288 at Tue Nov 27 17:39:55 PST 2012
kill -USR1 54288
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54288 killed at Tue Nov 27 17:39:55 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:39:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54336 >/dev/null 2>/dev/null
selfserv with PID 54336 found at Tue Nov 27 17:39:55 PST 2012
selfserv with PID 54336 started at Tue Nov 27 17:39:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2763: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54336 at Tue Nov 27 17:39:56 PST 2012
kill -USR1 54336
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54336 killed at Tue Nov 27 17:39:56 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:39:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54384 >/dev/null 2>/dev/null
selfserv with PID 54384 found at Tue Nov 27 17:39:56 PST 2012
selfserv with PID 54384 started at Tue Nov 27 17:39:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2764: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54384 at Tue Nov 27 17:39:56 PST 2012
kill -USR1 54384
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54384 killed at Tue Nov 27 17:39:56 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:39:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54432 >/dev/null 2>/dev/null
selfserv with PID 54432 found at Tue Nov 27 17:39:56 PST 2012
selfserv with PID 54432 started at Tue Nov 27 17:39:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54432 at Tue Nov 27 17:39:56 PST 2012
kill -USR1 54432
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54432 killed at Tue Nov 27 17:39:56 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:39:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54495 >/dev/null 2>/dev/null
selfserv with PID 54495 found at Tue Nov 27 17:39:56 PST 2012
selfserv with PID 54495 started at Tue Nov 27 17:39:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54495 at Tue Nov 27 17:39:57 PST 2012
kill -USR1 54495
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54495 killed at Tue Nov 27 17:39:57 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:39:57 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54543 >/dev/null 2>/dev/null
selfserv with PID 54543 found at Tue Nov 27 17:39:57 PST 2012
selfserv with PID 54543 started at Tue Nov 27 17:39:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54543 at Tue Nov 27 17:39:57 PST 2012
kill -USR1 54543
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54543 killed at Tue Nov 27 17:39:57 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:39:57 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54591 >/dev/null 2>/dev/null
selfserv with PID 54591 found at Tue Nov 27 17:39:57 PST 2012
selfserv with PID 54591 started at Tue Nov 27 17:39:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2768: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54591 at Tue Nov 27 17:39:57 PST 2012
kill -USR1 54591
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54591 killed at Tue Nov 27 17:39:57 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:39:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54639 >/dev/null 2>/dev/null
selfserv with PID 54639 found at Tue Nov 27 17:39:58 PST 2012
selfserv with PID 54639 started at Tue Nov 27 17:39:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2769: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54639 at Tue Nov 27 17:39:58 PST 2012
kill -USR1 54639
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54639 killed at Tue Nov 27 17:39:58 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:39:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54688 >/dev/null 2>/dev/null
selfserv with PID 54688 found at Tue Nov 27 17:39:58 PST 2012
selfserv with PID 54688 started at Tue Nov 27 17:39:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2770: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54688 at Tue Nov 27 17:39:58 PST 2012
kill -USR1 54688
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54688 killed at Tue Nov 27 17:39:58 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:39:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54736 >/dev/null 2>/dev/null
selfserv with PID 54736 found at Tue Nov 27 17:39:58 PST 2012
selfserv with PID 54736 started at Tue Nov 27 17:39:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54736 at Tue Nov 27 17:39:59 PST 2012
kill -USR1 54736
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54736 killed at Tue Nov 27 17:39:59 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:39:59 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54784 >/dev/null 2>/dev/null
selfserv with PID 54784 found at Tue Nov 27 17:39:59 PST 2012
selfserv with PID 54784 started at Tue Nov 27 17:39:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2772: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54784 at Tue Nov 27 17:39:59 PST 2012
kill -USR1 54784
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54784 killed at Tue Nov 27 17:39:59 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:39:59 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:39:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54832 >/dev/null 2>/dev/null
selfserv with PID 54832 found at Tue Nov 27 17:39:59 PST 2012
selfserv with PID 54832 started at Tue Nov 27 17:39:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54832 at Tue Nov 27 17:39:59 PST 2012
kill -USR1 54832
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54832 killed at Tue Nov 27 17:39:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:40:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54880 >/dev/null 2>/dev/null
selfserv with PID 54880 found at Tue Nov 27 17:40:00 PST 2012
selfserv with PID 54880 started at Tue Nov 27 17:40:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54880 at Tue Nov 27 17:40:00 PST 2012
kill -USR1 54880
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54880 killed at Tue Nov 27 17:40:00 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:40:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54928 >/dev/null 2>/dev/null
selfserv with PID 54928 found at Tue Nov 27 17:40:00 PST 2012
selfserv with PID 54928 started at Tue Nov 27 17:40:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2775: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54928 at Tue Nov 27 17:40:00 PST 2012
kill -USR1 54928
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54928 killed at Tue Nov 27 17:40:00 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:40:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54976 >/dev/null 2>/dev/null
selfserv with PID 54976 found at Tue Nov 27 17:40:00 PST 2012
selfserv with PID 54976 started at Tue Nov 27 17:40:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2776: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54976 at Tue Nov 27 17:40:01 PST 2012
kill -USR1 54976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54976 killed at Tue Nov 27 17:40:01 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:40:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55024 >/dev/null 2>/dev/null
selfserv with PID 55024 found at Tue Nov 27 17:40:01 PST 2012
selfserv with PID 55024 started at Tue Nov 27 17:40:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55024 at Tue Nov 27 17:40:01 PST 2012
kill -USR1 55024
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55024 killed at Tue Nov 27 17:40:01 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:40:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55072 >/dev/null 2>/dev/null
selfserv with PID 55072 found at Tue Nov 27 17:40:01 PST 2012
selfserv with PID 55072 started at Tue Nov 27 17:40:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55072 at Tue Nov 27 17:40:01 PST 2012
kill -USR1 55072
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55072 killed at Tue Nov 27 17:40:01 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:40:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55120 >/dev/null 2>/dev/null
selfserv with PID 55120 found at Tue Nov 27 17:40:02 PST 2012
selfserv with PID 55120 started at Tue Nov 27 17:40:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55120 at Tue Nov 27 17:40:02 PST 2012
kill -USR1 55120
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55120 killed at Tue Nov 27 17:40:02 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:40:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55168 >/dev/null 2>/dev/null
selfserv with PID 55168 found at Tue Nov 27 17:40:02 PST 2012
selfserv with PID 55168 started at Tue Nov 27 17:40:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2780: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55168 at Tue Nov 27 17:40:02 PST 2012
kill -USR1 55168
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55168 killed at Tue Nov 27 17:40:02 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:40:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55216 >/dev/null 2>/dev/null
selfserv with PID 55216 found at Tue Nov 27 17:40:02 PST 2012
selfserv with PID 55216 started at Tue Nov 27 17:40:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55216 at Tue Nov 27 17:40:03 PST 2012
kill -USR1 55216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55216 killed at Tue Nov 27 17:40:03 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:40:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55264 >/dev/null 2>/dev/null
selfserv with PID 55264 found at Tue Nov 27 17:40:03 PST 2012
selfserv with PID 55264 started at Tue Nov 27 17:40:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55264 at Tue Nov 27 17:40:03 PST 2012
kill -USR1 55264
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55264 killed at Tue Nov 27 17:40:03 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:40:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55312 >/dev/null 2>/dev/null
selfserv with PID 55312 found at Tue Nov 27 17:40:03 PST 2012
selfserv with PID 55312 started at Tue Nov 27 17:40:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55312 at Tue Nov 27 17:40:03 PST 2012
kill -USR1 55312
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55312 killed at Tue Nov 27 17:40:03 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:40:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55360 >/dev/null 2>/dev/null
selfserv with PID 55360 found at Tue Nov 27 17:40:03 PST 2012
selfserv with PID 55360 started at Tue Nov 27 17:40:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2784: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55360 at Tue Nov 27 17:40:04 PST 2012
kill -USR1 55360
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55360 killed at Tue Nov 27 17:40:04 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:40:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55408 >/dev/null 2>/dev/null
selfserv with PID 55408 found at Tue Nov 27 17:40:04 PST 2012
selfserv with PID 55408 started at Tue Nov 27 17:40:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55408 at Tue Nov 27 17:40:04 PST 2012
kill -USR1 55408
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55408 killed at Tue Nov 27 17:40:04 PST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:40:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55570 >/dev/null 2>/dev/null
selfserv with PID 55570 found at Tue Nov 27 17:40:04 PST 2012
selfserv with PID 55570 started at Tue Nov 27 17:40:05 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:05 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:06 PST 2012
ssl.sh: #2786: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55570 at Tue Nov 27 17:40:06 PST 2012
kill -USR1 55570
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55570 killed at Tue Nov 27 17:40:06 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:40:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55628 >/dev/null 2>/dev/null
selfserv with PID 55628 found at Tue Nov 27 17:40:06 PST 2012
selfserv with PID 55628 started at Tue Nov 27 17:40:06 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:07 PST 2012
ssl.sh: #2787: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55628 at Tue Nov 27 17:40:07 PST 2012
kill -USR1 55628
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55628 killed at Tue Nov 27 17:40:07 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:40:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55686 >/dev/null 2>/dev/null
selfserv with PID 55686 found at Tue Nov 27 17:40:07 PST 2012
selfserv with PID 55686 started at Tue Nov 27 17:40:07 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:08 PST 2012
ssl.sh: #2788: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55686 at Tue Nov 27 17:40:09 PST 2012
kill -USR1 55686
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55686 killed at Tue Nov 27 17:40:09 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:40:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55744 >/dev/null 2>/dev/null
selfserv with PID 55744 found at Tue Nov 27 17:40:09 PST 2012
selfserv with PID 55744 started at Tue Nov 27 17:40:09 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:09 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:40:10 PST 2012
ssl.sh: #2789: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55744 at Tue Nov 27 17:40:10 PST 2012
kill -USR1 55744
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55744 killed at Tue Nov 27 17:40:10 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:40:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55802 >/dev/null 2>/dev/null
selfserv with PID 55802 found at Tue Nov 27 17:40:10 PST 2012
selfserv with PID 55802 started at Tue Nov 27 17:40:10 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:12 PST 2012
ssl.sh: #2790: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55802 at Tue Nov 27 17:40:12 PST 2012
kill -USR1 55802
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55802 killed at Tue Nov 27 17:40:12 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:40:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55860 >/dev/null 2>/dev/null
selfserv with PID 55860 found at Tue Nov 27 17:40:12 PST 2012
selfserv with PID 55860 started at Tue Nov 27 17:40:12 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:40:13 PST 2012
ssl.sh: #2791: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55860 at Tue Nov 27 17:40:13 PST 2012
kill -USR1 55860
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55860 killed at Tue Nov 27 17:40:13 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:40:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55918 >/dev/null 2>/dev/null
selfserv with PID 55918 found at Tue Nov 27 17:40:13 PST 2012
selfserv with PID 55918 started at Tue Nov 27 17:40:13 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:40:15 PST 2012
ssl.sh: #2792: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 55918 at Tue Nov 27 17:40:15 PST 2012
kill -USR1 55918
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55918 killed at Tue Nov 27 17:40:15 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:40:15 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56005 >/dev/null 2>/dev/null
selfserv with PID 56005 found at Tue Nov 27 17:40:15 PST 2012
selfserv with PID 56005 started at Tue Nov 27 17:40:15 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:16 PST 2012
ssl.sh: #2793: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56005 at Tue Nov 27 17:40:16 PST 2012
kill -USR1 56005
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56005 killed at Tue Nov 27 17:40:16 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:40:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56063 >/dev/null 2>/dev/null
selfserv with PID 56063 found at Tue Nov 27 17:40:16 PST 2012
selfserv with PID 56063 started at Tue Nov 27 17:40:16 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:17 PST 2012
ssl.sh: #2794: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56063 at Tue Nov 27 17:40:17 PST 2012
kill -USR1 56063
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56063 killed at Tue Nov 27 17:40:17 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:40:17 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56121 >/dev/null 2>/dev/null
selfserv with PID 56121 found at Tue Nov 27 17:40:17 PST 2012
selfserv with PID 56121 started at Tue Nov 27 17:40:17 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:40:17 PST 2012
ssl.sh: #2795: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56121 at Tue Nov 27 17:40:17 PST 2012
kill -USR1 56121
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56121 killed at Tue Nov 27 17:40:17 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:40:17 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56180 >/dev/null 2>/dev/null
selfserv with PID 56180 found at Tue Nov 27 17:40:17 PST 2012
selfserv with PID 56180 started at Tue Nov 27 17:40:17 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:18 PST 2012
ssl.sh: #2796: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56180 at Tue Nov 27 17:40:18 PST 2012
kill -USR1 56180
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56180 killed at Tue Nov 27 17:40:18 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:40:18 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56239 >/dev/null 2>/dev/null
selfserv with PID 56239 found at Tue Nov 27 17:40:18 PST 2012
selfserv with PID 56239 started at Tue Nov 27 17:40:18 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:18 PST 2012
ssl.sh: #2797: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56239 at Tue Nov 27 17:40:18 PST 2012
kill -USR1 56239
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56239 killed at Tue Nov 27 17:40:18 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:40:18 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56297 >/dev/null 2>/dev/null
selfserv with PID 56297 found at Tue Nov 27 17:40:19 PST 2012
selfserv with PID 56297 started at Tue Nov 27 17:40:19 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:40:19 PST 2012
ssl.sh: #2798: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56297 at Tue Nov 27 17:40:19 PST 2012
kill -USR1 56297
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56297 killed at Tue Nov 27 17:40:19 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:40:19 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56355 >/dev/null 2>/dev/null
selfserv with PID 56355 found at Tue Nov 27 17:40:19 PST 2012
selfserv with PID 56355 started at Tue Nov 27 17:40:19 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:40:19 PST 2012
ssl.sh: #2799: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56355 at Tue Nov 27 17:40:20 PST 2012
kill -USR1 56355
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56355 killed at Tue Nov 27 17:40:20 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:40:20 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56442 >/dev/null 2>/dev/null
selfserv with PID 56442 found at Tue Nov 27 17:40:20 PST 2012
selfserv with PID 56442 started at Tue Nov 27 17:40:20 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:23 PST 2012
ssl.sh: #2800: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56442 at Tue Nov 27 17:40:23 PST 2012
kill -USR1 56442
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56442 killed at Tue Nov 27 17:40:23 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:40:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56500 >/dev/null 2>/dev/null
selfserv with PID 56500 found at Tue Nov 27 17:40:23 PST 2012
selfserv with PID 56500 started at Tue Nov 27 17:40:23 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:23 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:24 PST 2012
ssl.sh: #2801: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56500 at Tue Nov 27 17:40:24 PST 2012
kill -USR1 56500
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56500 killed at Tue Nov 27 17:40:24 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:40:24 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56558 >/dev/null 2>/dev/null
selfserv with PID 56558 found at Tue Nov 27 17:40:24 PST 2012
selfserv with PID 56558 started at Tue Nov 27 17:40:24 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:24 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:27 PST 2012
ssl.sh: #2802: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56558 at Tue Nov 27 17:40:27 PST 2012
kill -USR1 56558
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56558 killed at Tue Nov 27 17:40:27 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:40:27 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56616 >/dev/null 2>/dev/null
selfserv with PID 56616 found at Tue Nov 27 17:40:27 PST 2012
selfserv with PID 56616 started at Tue Nov 27 17:40:27 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:27 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:28 PST 2012
ssl.sh: #2803: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56616 at Tue Nov 27 17:40:28 PST 2012
kill -USR1 56616
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56616 killed at Tue Nov 27 17:40:28 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:40:28 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56674 >/dev/null 2>/dev/null
selfserv with PID 56674 found at Tue Nov 27 17:40:28 PST 2012
selfserv with PID 56674 started at Tue Nov 27 17:40:28 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:30 PST 2012
ssl.sh: #2804: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56674 at Tue Nov 27 17:40:30 PST 2012
kill -USR1 56674
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56674 killed at Tue Nov 27 17:40:30 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:40:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56732 >/dev/null 2>/dev/null
selfserv with PID 56732 found at Tue Nov 27 17:40:30 PST 2012
selfserv with PID 56732 started at Tue Nov 27 17:40:30 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:40:31 PST 2012
ssl.sh: #2805: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56732 at Tue Nov 27 17:40:31 PST 2012
kill -USR1 56732
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56732 killed at Tue Nov 27 17:40:31 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:40:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56811 >/dev/null 2>/dev/null
selfserv with PID 56811 found at Tue Nov 27 17:40:32 PST 2012
selfserv with PID 56811 started at Tue Nov 27 17:40:32 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:32 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:32 PST 2012
ssl.sh: #2806: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56811 at Tue Nov 27 17:40:32 PST 2012
kill -USR1 56811
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56811 killed at Tue Nov 27 17:40:32 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:40:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56869 >/dev/null 2>/dev/null
selfserv with PID 56869 found at Tue Nov 27 17:40:32 PST 2012
selfserv with PID 56869 started at Tue Nov 27 17:40:33 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:33 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:33 PST 2012
ssl.sh: #2807: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56869 at Tue Nov 27 17:40:33 PST 2012
kill -USR1 56869
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56869 killed at Tue Nov 27 17:40:33 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:40:33 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56927 >/dev/null 2>/dev/null
selfserv with PID 56927 found at Tue Nov 27 17:40:33 PST 2012
selfserv with PID 56927 started at Tue Nov 27 17:40:33 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:33 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:34 PST 2012
ssl.sh: #2808: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56927 at Tue Nov 27 17:40:34 PST 2012
kill -USR1 56927
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56927 killed at Tue Nov 27 17:40:34 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:40:34 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56985 >/dev/null 2>/dev/null
selfserv with PID 56985 found at Tue Nov 27 17:40:34 PST 2012
selfserv with PID 56985 started at Tue Nov 27 17:40:34 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:34 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:40:34 PST 2012
ssl.sh: #2809: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 56985 at Tue Nov 27 17:40:34 PST 2012
kill -USR1 56985
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56985 killed at Tue Nov 27 17:40:34 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:40:34 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57043 >/dev/null 2>/dev/null
selfserv with PID 57043 found at Tue Nov 27 17:40:35 PST 2012
selfserv with PID 57043 started at Tue Nov 27 17:40:35 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:35 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:40:35 PST 2012
ssl.sh: #2810: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 57043 at Tue Nov 27 17:40:35 PST 2012
kill -USR1 57043
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57043 killed at Tue Nov 27 17:40:35 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:40:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57101 >/dev/null 2>/dev/null
selfserv with PID 57101 found at Tue Nov 27 17:40:35 PST 2012
selfserv with PID 57101 started at Tue Nov 27 17:40:35 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:40:35 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:40:36 PST 2012
ssl.sh: #2811: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 57101 at Tue Nov 27 17:40:36 PST 2012
kill -USR1 57101
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57101 killed at Tue Nov 27 17:40:36 PST 2012
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the  server
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -fips false -force
FIPS mode disabled.
ssl.sh: #2812:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/server -list
ssl.sh: #2813:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2814:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  server
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -fips false -force
FIPS mode disabled.
ssl.sh: #2815:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_server -list
ssl.sh: #2816:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2817:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the  client
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -fips true -force
FIPS mode enabled.
ssl.sh: #2818:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -list
ssl.sh: #2819:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2820:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  client
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -fips true -force
FIPS mode enabled.
ssl.sh: #2821:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -list
ssl.sh: #2822:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2823:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server normal/client fips  - with ECC ===============================
selfserv starting at Tue Nov 27 17:40:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:37 PST 2012
selfserv with PID 57276 started at Tue Nov 27 17:40:37 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2824: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2825: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2826: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2827: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2828: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2829: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2830: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2831: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2832: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2833: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2834: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2835: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2837: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2838: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2843: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2844: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2848: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2852: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2856: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2860: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:40:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 57276 at Tue Nov 27 17:40:49 PST 2012
kill -USR1 57276
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57276 killed at Tue Nov 27 17:40:49 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:40:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58501 >/dev/null 2>/dev/null
selfserv with PID 58501 found at Tue Nov 27 17:40:49 PST 2012
selfserv with PID 58501 started at Tue Nov 27 17:40:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2864: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 58501 >/dev/null 2>/dev/null
selfserv with PID 58501 found at Tue Nov 27 17:40:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 58501 >/dev/null 2>/dev/null
selfserv with PID 58501 found at Tue Nov 27 17:40:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 58501 >/dev/null 2>/dev/null
selfserv with PID 58501 found at Tue Nov 27 17:40:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 58501 >/dev/null 2>/dev/null
selfserv with PID 58501 found at Tue Nov 27 17:40:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2868: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 58501 at Tue Nov 27 17:40:50 PST 2012
kill -USR1 58501
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58501 killed at Tue Nov 27 17:40:50 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:40:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:50 PST 2012
selfserv with PID 58640 started at Tue Nov 27 17:40:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2870: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2873: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2874: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2875: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2876: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2877: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2878: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2879: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2880: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2881: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2882: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 58640 >/dev/null 2>/dev/null
selfserv with PID 58640 found at Tue Nov 27 17:40:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2883: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 58640 at Tue Nov 27 17:40:54 PST 2012
kill -USR1 58640
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58640 killed at Tue Nov 27 17:40:54 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:40:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59030 >/dev/null 2>/dev/null
selfserv with PID 59030 found at Tue Nov 27 17:40:54 PST 2012
selfserv with PID 59030 started at Tue Nov 27 17:40:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2884: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 59030 >/dev/null 2>/dev/null
selfserv with PID 59030 found at Tue Nov 27 17:40:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2885: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 59030 >/dev/null 2>/dev/null
selfserv with PID 59030 found at Tue Nov 27 17:40:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2886: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 59030 >/dev/null 2>/dev/null
selfserv with PID 59030 found at Tue Nov 27 17:40:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2887: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 59030 >/dev/null 2>/dev/null
selfserv with PID 59030 found at Tue Nov 27 17:40:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2888: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 59030 at Tue Nov 27 17:40:56 PST 2012
kill -USR1 59030
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59030 killed at Tue Nov 27 17:40:56 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:40:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
selfserv with PID 59169 started at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2889: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2890: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2891: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2892: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2893: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2894: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2895: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2896: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2897: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2898: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2899: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2900: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2901: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2902: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 59169 >/dev/null 2>/dev/null
selfserv with PID 59169 found at Tue Nov 27 17:40:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2903: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 59169 at Tue Nov 27 17:40:59 PST 2012
kill -USR1 59169
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59169 killed at Tue Nov 27 17:40:59 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:40:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:40:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59545 >/dev/null 2>/dev/null
selfserv with PID 59545 found at Tue Nov 27 17:40:59 PST 2012
selfserv with PID 59545 started at Tue Nov 27 17:40:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2904: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 59545 >/dev/null 2>/dev/null
selfserv with PID 59545 found at Tue Nov 27 17:40:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2905: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 59545 >/dev/null 2>/dev/null
selfserv with PID 59545 found at Tue Nov 27 17:41:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2906: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 59545 >/dev/null 2>/dev/null
selfserv with PID 59545 found at Tue Nov 27 17:41:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2907: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 59545 >/dev/null 2>/dev/null
selfserv with PID 59545 found at Tue Nov 27 17:41:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2908: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 59545 at Tue Nov 27 17:41:00 PST 2012
kill -USR1 59545
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59545 killed at Tue Nov 27 17:41:00 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:41:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59684 >/dev/null 2>/dev/null
selfserv with PID 59684 found at Tue Nov 27 17:41:00 PST 2012
selfserv with PID 59684 started at Tue Nov 27 17:41:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2909: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 59684 >/dev/null 2>/dev/null
selfserv with PID 59684 found at Tue Nov 27 17:41:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2910: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 59684 >/dev/null 2>/dev/null
selfserv with PID 59684 found at Tue Nov 27 17:41:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2911: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 59684 >/dev/null 2>/dev/null
selfserv with PID 59684 found at Tue Nov 27 17:41:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2912: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 59684 >/dev/null 2>/dev/null
selfserv with PID 59684 found at Tue Nov 27 17:41:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2913: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59684 at Tue Nov 27 17:41:02 PST 2012
kill -USR1 59684
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59684 killed at Tue Nov 27 17:41:02 PST 2012
ssl.sh: SSL Client Authentication  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:41:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59880 >/dev/null 2>/dev/null
selfserv with PID 59880 found at Tue Nov 27 17:41:02 PST 2012
selfserv with PID 59880 started at Tue Nov 27 17:41:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2914: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59880 at Tue Nov 27 17:41:02 PST 2012
kill -USR1 59880
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59880 killed at Tue Nov 27 17:41:02 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:41:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59928 >/dev/null 2>/dev/null
selfserv with PID 59928 found at Tue Nov 27 17:41:02 PST 2012
selfserv with PID 59928 started at Tue Nov 27 17:41:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2915: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59928 at Tue Nov 27 17:41:05 PST 2012
kill -USR1 59928
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59928 killed at Tue Nov 27 17:41:05 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:41:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59976 >/dev/null 2>/dev/null
selfserv with PID 59976 found at Tue Nov 27 17:41:05 PST 2012
selfserv with PID 59976 started at Tue Nov 27 17:41:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2916: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59976 at Tue Nov 27 17:41:05 PST 2012
kill -USR1 59976
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59976 killed at Tue Nov 27 17:41:05 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:41:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60030 >/dev/null 2>/dev/null
selfserv with PID 60030 found at Tue Nov 27 17:41:05 PST 2012
selfserv with PID 60030 started at Tue Nov 27 17:41:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2917: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60030 at Tue Nov 27 17:41:05 PST 2012
kill -USR1 60030
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60030 killed at Tue Nov 27 17:41:05 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:41:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60078 >/dev/null 2>/dev/null
selfserv with PID 60078 found at Tue Nov 27 17:41:05 PST 2012
selfserv with PID 60078 started at Tue Nov 27 17:41:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2918: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60078 at Tue Nov 27 17:41:09 PST 2012
kill -USR1 60078
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60078 killed at Tue Nov 27 17:41:09 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:41:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60126 >/dev/null 2>/dev/null
selfserv with PID 60126 found at Tue Nov 27 17:41:09 PST 2012
selfserv with PID 60126 started at Tue Nov 27 17:41:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2919: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60126 at Tue Nov 27 17:41:09 PST 2012
kill -USR1 60126
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60126 killed at Tue Nov 27 17:41:09 PST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:41:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60180 >/dev/null 2>/dev/null
selfserv with PID 60180 found at Tue Nov 27 17:41:09 PST 2012
selfserv with PID 60180 started at Tue Nov 27 17:41:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2920: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60180 at Tue Nov 27 17:41:09 PST 2012
kill -USR1 60180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60180 killed at Tue Nov 27 17:41:09 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:41:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60228 >/dev/null 2>/dev/null
selfserv with PID 60228 found at Tue Nov 27 17:41:10 PST 2012
selfserv with PID 60228 started at Tue Nov 27 17:41:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2921: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60228 at Tue Nov 27 17:41:12 PST 2012
kill -USR1 60228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60228 killed at Tue Nov 27 17:41:12 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:41:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60276 >/dev/null 2>/dev/null
selfserv with PID 60276 found at Tue Nov 27 17:41:12 PST 2012
selfserv with PID 60276 started at Tue Nov 27 17:41:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60276 at Tue Nov 27 17:41:12 PST 2012
kill -USR1 60276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60276 killed at Tue Nov 27 17:41:12 PST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:41:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60330 >/dev/null 2>/dev/null
selfserv with PID 60330 found at Tue Nov 27 17:41:12 PST 2012
selfserv with PID 60330 started at Tue Nov 27 17:41:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2923: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60330 at Tue Nov 27 17:41:13 PST 2012
kill -USR1 60330
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60330 killed at Tue Nov 27 17:41:13 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:41:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60378 >/dev/null 2>/dev/null
selfserv with PID 60378 found at Tue Nov 27 17:41:13 PST 2012
selfserv with PID 60378 started at Tue Nov 27 17:41:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2924: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60378 at Tue Nov 27 17:41:15 PST 2012
kill -USR1 60378
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60378 killed at Tue Nov 27 17:41:15 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:41:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60426 >/dev/null 2>/dev/null
selfserv with PID 60426 found at Tue Nov 27 17:41:15 PST 2012
selfserv with PID 60426 started at Tue Nov 27 17:41:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60426 at Tue Nov 27 17:41:15 PST 2012
kill -USR1 60426
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60426 killed at Tue Nov 27 17:41:15 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:41:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60480 >/dev/null 2>/dev/null
selfserv with PID 60480 found at Tue Nov 27 17:41:15 PST 2012
selfserv with PID 60480 started at Tue Nov 27 17:41:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2926: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60480 at Tue Nov 27 17:41:16 PST 2012
kill -USR1 60480
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60480 killed at Tue Nov 27 17:41:16 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:41:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60528 >/dev/null 2>/dev/null
selfserv with PID 60528 found at Tue Nov 27 17:41:16 PST 2012
selfserv with PID 60528 started at Tue Nov 27 17:41:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2927: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60528 at Tue Nov 27 17:41:18 PST 2012
kill -USR1 60528
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60528 killed at Tue Nov 27 17:41:18 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:41:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60580 >/dev/null 2>/dev/null
selfserv with PID 60580 found at Tue Nov 27 17:41:18 PST 2012
selfserv with PID 60580 started at Tue Nov 27 17:41:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60580 at Tue Nov 27 17:41:18 PST 2012
kill -USR1 60580
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60580 killed at Tue Nov 27 17:41:18 PST 2012
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:41:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60647 >/dev/null 2>/dev/null
selfserv with PID 60647 found at Tue Nov 27 17:41:19 PST 2012
selfserv with PID 60647 started at Tue Nov 27 17:41:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2929: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60647 at Tue Nov 27 17:41:21 PST 2012
kill -USR1 60647
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60647 killed at Tue Nov 27 17:41:21 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:41:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60695 >/dev/null 2>/dev/null
selfserv with PID 60695 found at Tue Nov 27 17:41:21 PST 2012
selfserv with PID 60695 started at Tue Nov 27 17:41:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2930: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60695 at Tue Nov 27 17:41:21 PST 2012
kill -USR1 60695
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60695 killed at Tue Nov 27 17:41:21 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:41:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60747 >/dev/null 2>/dev/null
selfserv with PID 60747 found at Tue Nov 27 17:41:21 PST 2012
selfserv with PID 60747 started at Tue Nov 27 17:41:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2931: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60747 at Tue Nov 27 17:41:25 PST 2012
kill -USR1 60747
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60747 killed at Tue Nov 27 17:41:25 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:41:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60795 >/dev/null 2>/dev/null
selfserv with PID 60795 found at Tue Nov 27 17:41:25 PST 2012
selfserv with PID 60795 started at Tue Nov 27 17:41:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2932: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60795 at Tue Nov 27 17:41:25 PST 2012
kill -USR1 60795
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60795 killed at Tue Nov 27 17:41:25 PST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:41:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60847 >/dev/null 2>/dev/null
selfserv with PID 60847 found at Tue Nov 27 17:41:25 PST 2012
selfserv with PID 60847 started at Tue Nov 27 17:41:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2933: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60847 at Tue Nov 27 17:41:27 PST 2012
kill -USR1 60847
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60847 killed at Tue Nov 27 17:41:27 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:41:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60895 >/dev/null 2>/dev/null
selfserv with PID 60895 found at Tue Nov 27 17:41:28 PST 2012
selfserv with PID 60895 started at Tue Nov 27 17:41:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60895 at Tue Nov 27 17:41:28 PST 2012
kill -USR1 60895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60895 killed at Tue Nov 27 17:41:28 PST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:41:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60947 >/dev/null 2>/dev/null
selfserv with PID 60947 found at Tue Nov 27 17:41:28 PST 2012
selfserv with PID 60947 started at Tue Nov 27 17:41:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2935: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60947 at Tue Nov 27 17:41:30 PST 2012
kill -USR1 60947
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60947 killed at Tue Nov 27 17:41:30 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:41:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60995 >/dev/null 2>/dev/null
selfserv with PID 60995 found at Tue Nov 27 17:41:30 PST 2012
selfserv with PID 60995 started at Tue Nov 27 17:41:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2936: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60995 at Tue Nov 27 17:41:31 PST 2012
kill -USR1 60995
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60995 killed at Tue Nov 27 17:41:31 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:41:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61047 >/dev/null 2>/dev/null
selfserv with PID 61047 found at Tue Nov 27 17:41:31 PST 2012
selfserv with PID 61047 started at Tue Nov 27 17:41:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2937: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 61047 at Tue Nov 27 17:41:33 PST 2012
kill -USR1 61047
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61047 killed at Tue Nov 27 17:41:33 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:41:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61095 >/dev/null 2>/dev/null
selfserv with PID 61095 found at Tue Nov 27 17:41:33 PST 2012
selfserv with PID 61095 started at Tue Nov 27 17:41:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2938: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 61095 at Tue Nov 27 17:41:33 PST 2012
kill -USR1 61095
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61095 killed at Tue Nov 27 17:41:33 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:41:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61164 >/dev/null 2>/dev/null
selfserv with PID 61164 found at Tue Nov 27 17:41:34 PST 2012
selfserv with PID 61164 started at Tue Nov 27 17:41:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2939: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 61164 at Tue Nov 27 17:41:34 PST 2012
kill -USR1 61164
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61164 killed at Tue Nov 27 17:41:34 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:41:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61218 >/dev/null 2>/dev/null
selfserv with PID 61218 found at Tue Nov 27 17:41:34 PST 2012
selfserv with PID 61218 started at Tue Nov 27 17:41:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 61218 at Tue Nov 27 17:41:34 PST 2012
kill -USR1 61218
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61218 killed at Tue Nov 27 17:41:34 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:41:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61272 >/dev/null 2>/dev/null
selfserv with PID 61272 found at Tue Nov 27 17:41:34 PST 2012
selfserv with PID 61272 started at Tue Nov 27 17:41:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2941: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 61272 at Tue Nov 27 17:41:35 PST 2012
kill -USR1 61272
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61272 killed at Tue Nov 27 17:41:35 PST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:41:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61326 >/dev/null 2>/dev/null
selfserv with PID 61326 found at Tue Nov 27 17:41:35 PST 2012
selfserv with PID 61326 started at Tue Nov 27 17:41:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 61326 at Tue Nov 27 17:41:35 PST 2012
kill -USR1 61326
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61326 killed at Tue Nov 27 17:41:35 PST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 17:41:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61380 >/dev/null 2>/dev/null
selfserv with PID 61380 found at Tue Nov 27 17:41:35 PST 2012
selfserv with PID 61380 started at Tue Nov 27 17:41:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2943: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 61380 at Tue Nov 27 17:41:35 PST 2012
kill -USR1 61380
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61380 killed at Tue Nov 27 17:41:35 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:41:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61434 >/dev/null 2>/dev/null
selfserv with PID 61434 found at Tue Nov 27 17:41:35 PST 2012
selfserv with PID 61434 started at Tue Nov 27 17:41:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 61434 at Tue Nov 27 17:41:36 PST 2012
kill -USR1 61434
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61434 killed at Tue Nov 27 17:41:36 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:41:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61488 >/dev/null 2>/dev/null
selfserv with PID 61488 found at Tue Nov 27 17:41:36 PST 2012
selfserv with PID 61488 started at Tue Nov 27 17:41:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2945: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 61488 at Tue Nov 27 17:41:36 PST 2012
kill -USR1 61488
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61488 killed at Tue Nov 27 17:41:36 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 17:41:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61542 >/dev/null 2>/dev/null
selfserv with PID 61542 found at Tue Nov 27 17:41:36 PST 2012
selfserv with PID 61542 started at Tue Nov 27 17:41:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2946: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 61542 at Tue Nov 27 17:41:36 PST 2012
kill -USR1 61542
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61542 killed at Tue Nov 27 17:41:36 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 17:41:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61596 >/dev/null 2>/dev/null
selfserv with PID 61596 found at Tue Nov 27 17:41:37 PST 2012
selfserv with PID 61596 started at Tue Nov 27 17:41:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2947: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 61596 at Tue Nov 27 17:41:37 PST 2012
kill -USR1 61596
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61596 killed at Tue Nov 27 17:41:37 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:41:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61650 >/dev/null 2>/dev/null
selfserv with PID 61650 found at Tue Nov 27 17:41:37 PST 2012
selfserv with PID 61650 started at Tue Nov 27 17:41:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2948: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 61650 at Tue Nov 27 17:41:37 PST 2012
kill -USR1 61650
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61650 killed at Tue Nov 27 17:41:37 PST 2012
ssl.sh: SSL Stress Test  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:41:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61795 >/dev/null 2>/dev/null
selfserv with PID 61795 found at Tue Nov 27 17:41:38 PST 2012
selfserv with PID 61795 started at Tue Nov 27 17:41:38 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:38 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:41:38 PST 2012
ssl.sh: #2949: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 61795 at Tue Nov 27 17:41:39 PST 2012
kill -USR1 61795
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61795 killed at Tue Nov 27 17:41:39 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:41:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61853 >/dev/null 2>/dev/null
selfserv with PID 61853 found at Tue Nov 27 17:41:39 PST 2012
selfserv with PID 61853 started at Tue Nov 27 17:41:39 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:39 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:41:39 PST 2012
ssl.sh: #2950: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 61853 at Tue Nov 27 17:41:39 PST 2012
kill -USR1 61853
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61853 killed at Tue Nov 27 17:41:39 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:41:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61911 >/dev/null 2>/dev/null
selfserv with PID 61911 found at Tue Nov 27 17:41:40 PST 2012
selfserv with PID 61911 started at Tue Nov 27 17:41:40 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:40 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:41:40 PST 2012
ssl.sh: #2951: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 61911 at Tue Nov 27 17:41:40 PST 2012
kill -USR1 61911
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61911 killed at Tue Nov 27 17:41:40 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:41:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61969 >/dev/null 2>/dev/null
selfserv with PID 61969 found at Tue Nov 27 17:41:40 PST 2012
selfserv with PID 61969 started at Tue Nov 27 17:41:40 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:40 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:41:41 PST 2012
ssl.sh: #2952: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 61969 at Tue Nov 27 17:41:41 PST 2012
kill -USR1 61969
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61969 killed at Tue Nov 27 17:41:41 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:41:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62027 >/dev/null 2>/dev/null
selfserv with PID 62027 found at Tue Nov 27 17:41:41 PST 2012
selfserv with PID 62027 started at Tue Nov 27 17:41:41 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:41 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:41:41 PST 2012
ssl.sh: #2953: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62027 at Tue Nov 27 17:41:41 PST 2012
kill -USR1 62027
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62027 killed at Tue Nov 27 17:41:41 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:41:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62085 >/dev/null 2>/dev/null
selfserv with PID 62085 found at Tue Nov 27 17:41:41 PST 2012
selfserv with PID 62085 started at Tue Nov 27 17:41:41 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:41 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:41:42 PST 2012
ssl.sh: #2954: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62085 at Tue Nov 27 17:41:42 PST 2012
kill -USR1 62085
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62085 killed at Tue Nov 27 17:41:42 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:41:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62143 >/dev/null 2>/dev/null
selfserv with PID 62143 found at Tue Nov 27 17:41:42 PST 2012
selfserv with PID 62143 started at Tue Nov 27 17:41:42 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:42 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:41:42 PST 2012
ssl.sh: #2955: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62143 at Tue Nov 27 17:41:42 PST 2012
kill -USR1 62143
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62143 killed at Tue Nov 27 17:41:42 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 17:41:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62207 >/dev/null 2>/dev/null
selfserv with PID 62207 found at Tue Nov 27 17:41:42 PST 2012
selfserv with PID 62207 started at Tue Nov 27 17:41:42 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:42 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:41:44 PST 2012
ssl.sh: #2956: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62207 at Tue Nov 27 17:41:44 PST 2012
kill -USR1 62207
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62207 killed at Tue Nov 27 17:41:44 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 17:41:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62271 >/dev/null 2>/dev/null
selfserv with PID 62271 found at Tue Nov 27 17:41:44 PST 2012
selfserv with PID 62271 started at Tue Nov 27 17:41:44 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:44 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:41:46 PST 2012
ssl.sh: #2957: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62271 at Tue Nov 27 17:41:46 PST 2012
kill -USR1 62271
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62271 killed at Tue Nov 27 17:41:46 PST 2012
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:41:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62387 >/dev/null 2>/dev/null
selfserv with PID 62387 found at Tue Nov 27 17:41:46 PST 2012
selfserv with PID 62387 started at Tue Nov 27 17:41:46 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:47 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:41:47 PST 2012
ssl.sh: #2958: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62387 at Tue Nov 27 17:41:47 PST 2012
kill -USR1 62387
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62387 killed at Tue Nov 27 17:41:47 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:41:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62445 >/dev/null 2>/dev/null
selfserv with PID 62445 found at Tue Nov 27 17:41:47 PST 2012
selfserv with PID 62445 started at Tue Nov 27 17:41:47 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:47 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:41:48 PST 2012
ssl.sh: #2959: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62445 at Tue Nov 27 17:41:48 PST 2012
kill -USR1 62445
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62445 killed at Tue Nov 27 17:41:48 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:41:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62503 >/dev/null 2>/dev/null
selfserv with PID 62503 found at Tue Nov 27 17:41:48 PST 2012
selfserv with PID 62503 started at Tue Nov 27 17:41:48 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:48 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:41:48 PST 2012
ssl.sh: #2960: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62503 at Tue Nov 27 17:41:48 PST 2012
kill -USR1 62503
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62503 killed at Tue Nov 27 17:41:48 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:41:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62561 >/dev/null 2>/dev/null
selfserv with PID 62561 found at Tue Nov 27 17:41:49 PST 2012
selfserv with PID 62561 started at Tue Nov 27 17:41:49 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:41:49 PST 2012
ssl.sh: #2961: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62561 at Tue Nov 27 17:41:49 PST 2012
kill -USR1 62561
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62561 killed at Tue Nov 27 17:41:49 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:41:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62619 >/dev/null 2>/dev/null
selfserv with PID 62619 found at Tue Nov 27 17:41:49 PST 2012
selfserv with PID 62619 started at Tue Nov 27 17:41:49 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:41:50 PST 2012
ssl.sh: #2962: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62619 at Tue Nov 27 17:41:50 PST 2012
kill -USR1 62619
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62619 killed at Tue Nov 27 17:41:50 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:41:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62677 >/dev/null 2>/dev/null
selfserv with PID 62677 found at Tue Nov 27 17:41:50 PST 2012
selfserv with PID 62677 started at Tue Nov 27 17:41:50 PST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:41:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:41:50 PST 2012
ssl.sh: #2963: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 62677 at Tue Nov 27 17:41:50 PST 2012
kill -USR1 62677
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62677 killed at Tue Nov 27 17:41:50 PST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips  - with ECC ===============================
selfserv starting at Tue Nov 27 17:41:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:41:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:50 PST 2012
selfserv with PID 62722 started at Tue Nov 27 17:41:50 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2964: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2965: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2966: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2967: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2968: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2969: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2970: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2971: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2972: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2973: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:41:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:42:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:42:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:42:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:42:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:42:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 62722 >/dev/null 2>/dev/null
selfserv with PID 62722 found at Tue Nov 27 17:42:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 62722 at Tue Nov 27 17:42:01 PST 2012
kill -USR1 62722
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 62722 killed at Tue Nov 27 17:42:01 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:42:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 63936 >/dev/null 2>/dev/null
selfserv with PID 63936 found at Tue Nov 27 17:42:01 PST 2012
selfserv with PID 63936 started at Tue Nov 27 17:42:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 63936 >/dev/null 2>/dev/null
selfserv with PID 63936 found at Tue Nov 27 17:42:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 63936 >/dev/null 2>/dev/null
selfserv with PID 63936 found at Tue Nov 27 17:42:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 63936 >/dev/null 2>/dev/null
selfserv with PID 63936 found at Tue Nov 27 17:42:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 63936 >/dev/null 2>/dev/null
selfserv with PID 63936 found at Tue Nov 27 17:42:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 63936 at Tue Nov 27 17:42:03 PST 2012
kill -USR1 63936
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 63936 killed at Tue Nov 27 17:42:03 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:42:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:03 PST 2012
selfserv with PID 64075 started at Tue Nov 27 17:42:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64075 >/dev/null 2>/dev/null
selfserv with PID 64075 found at Tue Nov 27 17:42:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 64075 at Tue Nov 27 17:42:07 PST 2012
kill -USR1 64075
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 64075 killed at Tue Nov 27 17:42:07 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:42:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 64465 >/dev/null 2>/dev/null
selfserv with PID 64465 found at Tue Nov 27 17:42:07 PST 2012
selfserv with PID 64465 started at Tue Nov 27 17:42:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 64465 >/dev/null 2>/dev/null
selfserv with PID 64465 found at Tue Nov 27 17:42:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64465 >/dev/null 2>/dev/null
selfserv with PID 64465 found at Tue Nov 27 17:42:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64465 >/dev/null 2>/dev/null
selfserv with PID 64465 found at Tue Nov 27 17:42:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64465 >/dev/null 2>/dev/null
selfserv with PID 64465 found at Tue Nov 27 17:42:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 64465 at Tue Nov 27 17:42:08 PST 2012
kill -USR1 64465
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 64465 killed at Tue Nov 27 17:42:08 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:42:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:09 PST 2012
selfserv with PID 64604 started at Tue Nov 27 17:42:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64604 >/dev/null 2>/dev/null
selfserv with PID 64604 found at Tue Nov 27 17:42:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 64604 at Tue Nov 27 17:42:13 PST 2012
kill -USR1 64604
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 64604 killed at Tue Nov 27 17:42:13 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:42:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 64983 >/dev/null 2>/dev/null
selfserv with PID 64983 found at Tue Nov 27 17:42:13 PST 2012
selfserv with PID 64983 started at Tue Nov 27 17:42:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 64983 >/dev/null 2>/dev/null
selfserv with PID 64983 found at Tue Nov 27 17:42:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 64983 >/dev/null 2>/dev/null
selfserv with PID 64983 found at Tue Nov 27 17:42:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 64983 >/dev/null 2>/dev/null
selfserv with PID 64983 found at Tue Nov 27 17:42:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 64983 >/dev/null 2>/dev/null
selfserv with PID 64983 found at Tue Nov 27 17:42:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 64983 at Tue Nov 27 17:42:14 PST 2012
kill -USR1 64983
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 64983 killed at Tue Nov 27 17:42:14 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:42:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65122 >/dev/null 2>/dev/null
selfserv with PID 65122 found at Tue Nov 27 17:42:14 PST 2012
selfserv with PID 65122 started at Tue Nov 27 17:42:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 65122 >/dev/null 2>/dev/null
selfserv with PID 65122 found at Tue Nov 27 17:42:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 65122 >/dev/null 2>/dev/null
selfserv with PID 65122 found at Tue Nov 27 17:42:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 65122 >/dev/null 2>/dev/null
selfserv with PID 65122 found at Tue Nov 27 17:42:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 65122 >/dev/null 2>/dev/null
selfserv with PID 65122 found at Tue Nov 27 17:42:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 65122 at Tue Nov 27 17:42:16 PST 2012
kill -USR1 65122
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65122 killed at Tue Nov 27 17:42:16 PST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:42:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65318 >/dev/null 2>/dev/null
selfserv with PID 65318 found at Tue Nov 27 17:42:16 PST 2012
selfserv with PID 65318 started at Tue Nov 27 17:42:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3054: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65318 at Tue Nov 27 17:42:16 PST 2012
kill -USR1 65318
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65318 killed at Tue Nov 27 17:42:16 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:42:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65366 >/dev/null 2>/dev/null
selfserv with PID 65366 found at Tue Nov 27 17:42:16 PST 2012
selfserv with PID 65366 started at Tue Nov 27 17:42:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3055: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65366 at Tue Nov 27 17:42:18 PST 2012
kill -USR1 65366
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65366 killed at Tue Nov 27 17:42:18 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:42:19 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65416 >/dev/null 2>/dev/null
selfserv with PID 65416 found at Tue Nov 27 17:42:19 PST 2012
selfserv with PID 65416 started at Tue Nov 27 17:42:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 65416 at Tue Nov 27 17:42:19 PST 2012
kill -USR1 65416
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65416 killed at Tue Nov 27 17:42:19 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:42:19 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65470 >/dev/null 2>/dev/null
selfserv with PID 65470 found at Tue Nov 27 17:42:19 PST 2012
selfserv with PID 65470 started at Tue Nov 27 17:42:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3057: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65470 at Tue Nov 27 17:42:19 PST 2012
kill -USR1 65470
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65470 killed at Tue Nov 27 17:42:19 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:42:19 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65518 >/dev/null 2>/dev/null
selfserv with PID 65518 found at Tue Nov 27 17:42:19 PST 2012
selfserv with PID 65518 started at Tue Nov 27 17:42:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3058: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65518 at Tue Nov 27 17:42:23 PST 2012
kill -USR1 65518
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65518 killed at Tue Nov 27 17:42:23 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:42:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65566 >/dev/null 2>/dev/null
selfserv with PID 65566 found at Tue Nov 27 17:42:23 PST 2012
selfserv with PID 65566 started at Tue Nov 27 17:42:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 65566 at Tue Nov 27 17:42:23 PST 2012
kill -USR1 65566
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65566 killed at Tue Nov 27 17:42:23 PST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:42:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65620 >/dev/null 2>/dev/null
selfserv with PID 65620 found at Tue Nov 27 17:42:23 PST 2012
selfserv with PID 65620 started at Tue Nov 27 17:42:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3060: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65620 at Tue Nov 27 17:42:23 PST 2012
kill -USR1 65620
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65620 killed at Tue Nov 27 17:42:23 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:42:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65668 >/dev/null 2>/dev/null
selfserv with PID 65668 found at Tue Nov 27 17:42:23 PST 2012
selfserv with PID 65668 started at Tue Nov 27 17:42:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3061: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65668 at Tue Nov 27 17:42:26 PST 2012
kill -USR1 65668
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65668 killed at Tue Nov 27 17:42:26 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:42:26 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65716 >/dev/null 2>/dev/null
selfserv with PID 65716 found at Tue Nov 27 17:42:26 PST 2012
selfserv with PID 65716 started at Tue Nov 27 17:42:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 65716 at Tue Nov 27 17:42:26 PST 2012
kill -USR1 65716
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65716 killed at Tue Nov 27 17:42:26 PST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:42:26 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65770 >/dev/null 2>/dev/null
selfserv with PID 65770 found at Tue Nov 27 17:42:26 PST 2012
selfserv with PID 65770 started at Tue Nov 27 17:42:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3063: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65770 at Tue Nov 27 17:42:26 PST 2012
kill -USR1 65770
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65770 killed at Tue Nov 27 17:42:26 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:42:27 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65818 >/dev/null 2>/dev/null
selfserv with PID 65818 found at Tue Nov 27 17:42:27 PST 2012
selfserv with PID 65818 started at Tue Nov 27 17:42:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3064: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65818 at Tue Nov 27 17:42:29 PST 2012
kill -USR1 65818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65818 killed at Tue Nov 27 17:42:29 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:42:29 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65866 >/dev/null 2>/dev/null
selfserv with PID 65866 found at Tue Nov 27 17:42:29 PST 2012
selfserv with PID 65866 started at Tue Nov 27 17:42:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 65866 at Tue Nov 27 17:42:29 PST 2012
kill -USR1 65866
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65866 killed at Tue Nov 27 17:42:29 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:42:29 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65920 >/dev/null 2>/dev/null
selfserv with PID 65920 found at Tue Nov 27 17:42:29 PST 2012
selfserv with PID 65920 started at Tue Nov 27 17:42:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3066: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65920 at Tue Nov 27 17:42:30 PST 2012
kill -USR1 65920
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65920 killed at Tue Nov 27 17:42:30 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:42:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 65968 >/dev/null 2>/dev/null
selfserv with PID 65968 found at Tue Nov 27 17:42:30 PST 2012
selfserv with PID 65968 started at Tue Nov 27 17:42:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3067: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 65968 at Tue Nov 27 17:42:32 PST 2012
kill -USR1 65968
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 65968 killed at Tue Nov 27 17:42:32 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:42:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66016 >/dev/null 2>/dev/null
selfserv with PID 66016 found at Tue Nov 27 17:42:32 PST 2012
selfserv with PID 66016 started at Tue Nov 27 17:42:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3068: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 66016 at Tue Nov 27 17:42:32 PST 2012
kill -USR1 66016
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66016 killed at Tue Nov 27 17:42:32 PST 2012
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:42:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66083 >/dev/null 2>/dev/null
selfserv with PID 66083 found at Tue Nov 27 17:42:32 PST 2012
selfserv with PID 66083 started at Tue Nov 27 17:42:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3069: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 66083 at Tue Nov 27 17:42:35 PST 2012
kill -USR1 66083
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66083 killed at Tue Nov 27 17:42:35 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:42:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66131 >/dev/null 2>/dev/null
selfserv with PID 66131 found at Tue Nov 27 17:42:35 PST 2012
selfserv with PID 66131 started at Tue Nov 27 17:42:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3070: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 66131 at Tue Nov 27 17:42:35 PST 2012
kill -USR1 66131
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66131 killed at Tue Nov 27 17:42:35 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:42:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66183 >/dev/null 2>/dev/null
selfserv with PID 66183 found at Tue Nov 27 17:42:35 PST 2012
selfserv with PID 66183 started at Tue Nov 27 17:42:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3071: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 66183 at Tue Nov 27 17:42:39 PST 2012
kill -USR1 66183
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66183 killed at Tue Nov 27 17:42:39 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:42:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66231 >/dev/null 2>/dev/null
selfserv with PID 66231 found at Tue Nov 27 17:42:39 PST 2012
selfserv with PID 66231 started at Tue Nov 27 17:42:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3072: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 66231 at Tue Nov 27 17:42:39 PST 2012
kill -USR1 66231
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66231 killed at Tue Nov 27 17:42:39 PST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:42:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66283 >/dev/null 2>/dev/null
selfserv with PID 66283 found at Tue Nov 27 17:42:39 PST 2012
selfserv with PID 66283 started at Tue Nov 27 17:42:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3073: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 66283 at Tue Nov 27 17:42:42 PST 2012
kill -USR1 66283
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66283 killed at Tue Nov 27 17:42:42 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:42:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66331 >/dev/null 2>/dev/null
selfserv with PID 66331 found at Tue Nov 27 17:42:42 PST 2012
selfserv with PID 66331 started at Tue Nov 27 17:42:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3074: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 66331 at Tue Nov 27 17:42:42 PST 2012
kill -USR1 66331
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66331 killed at Tue Nov 27 17:42:42 PST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:42:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66383 >/dev/null 2>/dev/null
selfserv with PID 66383 found at Tue Nov 27 17:42:42 PST 2012
selfserv with PID 66383 started at Tue Nov 27 17:42:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3075: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 66383 at Tue Nov 27 17:42:45 PST 2012
kill -USR1 66383
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66383 killed at Tue Nov 27 17:42:45 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:42:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66441 >/dev/null 2>/dev/null
selfserv with PID 66441 found at Tue Nov 27 17:42:45 PST 2012
selfserv with PID 66441 started at Tue Nov 27 17:42:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3076: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 66441 at Tue Nov 27 17:42:45 PST 2012
kill -USR1 66441
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66441 killed at Tue Nov 27 17:42:45 PST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:42:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66493 >/dev/null 2>/dev/null
selfserv with PID 66493 found at Tue Nov 27 17:42:45 PST 2012
selfserv with PID 66493 started at Tue Nov 27 17:42:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3077: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 66493 at Tue Nov 27 17:42:47 PST 2012
kill -USR1 66493
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66493 killed at Tue Nov 27 17:42:47 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:42:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66541 >/dev/null 2>/dev/null
selfserv with PID 66541 found at Tue Nov 27 17:42:47 PST 2012
selfserv with PID 66541 started at Tue Nov 27 17:42:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3078: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 66541 at Tue Nov 27 17:42:48 PST 2012
kill -USR1 66541
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66541 killed at Tue Nov 27 17:42:48 PST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:42:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66721 >/dev/null 2>/dev/null
selfserv with PID 66721 found at Tue Nov 27 17:42:48 PST 2012
selfserv with PID 66721 started at Tue Nov 27 17:42:48 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:48 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:42:49 PST 2012
ssl.sh: #3079: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 66721 at Tue Nov 27 17:42:49 PST 2012
kill -USR1 66721
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66721 killed at Tue Nov 27 17:42:49 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:42:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66779 >/dev/null 2>/dev/null
selfserv with PID 66779 found at Tue Nov 27 17:42:49 PST 2012
selfserv with PID 66779 started at Tue Nov 27 17:42:49 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:42:50 PST 2012
ssl.sh: #3080: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 66779 at Tue Nov 27 17:42:50 PST 2012
kill -USR1 66779
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66779 killed at Tue Nov 27 17:42:50 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:42:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66837 >/dev/null 2>/dev/null
selfserv with PID 66837 found at Tue Nov 27 17:42:50 PST 2012
selfserv with PID 66837 started at Tue Nov 27 17:42:50 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:42:51 PST 2012
ssl.sh: #3081: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 66837 at Tue Nov 27 17:42:51 PST 2012
kill -USR1 66837
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66837 killed at Tue Nov 27 17:42:51 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:42:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66895 >/dev/null 2>/dev/null
selfserv with PID 66895 found at Tue Nov 27 17:42:51 PST 2012
selfserv with PID 66895 started at Tue Nov 27 17:42:51 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:42:51 PST 2012
ssl.sh: #3082: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 66895 at Tue Nov 27 17:42:51 PST 2012
kill -USR1 66895
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66895 killed at Tue Nov 27 17:42:51 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:42:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66953 >/dev/null 2>/dev/null
selfserv with PID 66953 found at Tue Nov 27 17:42:51 PST 2012
selfserv with PID 66953 started at Tue Nov 27 17:42:51 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:42:52 PST 2012
ssl.sh: #3083: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 66953 at Tue Nov 27 17:42:52 PST 2012
kill -USR1 66953
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66953 killed at Tue Nov 27 17:42:52 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:42:52 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67011 >/dev/null 2>/dev/null
selfserv with PID 67011 found at Tue Nov 27 17:42:52 PST 2012
selfserv with PID 67011 started at Tue Nov 27 17:42:52 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:42:52 PST 2012
ssl.sh: #3084: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67011 at Tue Nov 27 17:42:52 PST 2012
kill -USR1 67011
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67011 killed at Tue Nov 27 17:42:52 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:42:52 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67069 >/dev/null 2>/dev/null
selfserv with PID 67069 found at Tue Nov 27 17:42:52 PST 2012
selfserv with PID 67069 started at Tue Nov 27 17:42:52 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:42:53 PST 2012
ssl.sh: #3085: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67069 at Tue Nov 27 17:42:53 PST 2012
kill -USR1 67069
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67069 killed at Tue Nov 27 17:42:53 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:42:53 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67183 >/dev/null 2>/dev/null
selfserv with PID 67183 found at Tue Nov 27 17:42:53 PST 2012
selfserv with PID 67183 started at Tue Nov 27 17:42:53 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:53 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:42:54 PST 2012
ssl.sh: #3086: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67183 at Tue Nov 27 17:42:54 PST 2012
kill -USR1 67183
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67183 killed at Tue Nov 27 17:42:54 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:42:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67241 >/dev/null 2>/dev/null
selfserv with PID 67241 found at Tue Nov 27 17:42:54 PST 2012
selfserv with PID 67241 started at Tue Nov 27 17:42:54 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:42:54 PST 2012
ssl.sh: #3087: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67241 at Tue Nov 27 17:42:54 PST 2012
kill -USR1 67241
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67241 killed at Tue Nov 27 17:42:54 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:42:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67299 >/dev/null 2>/dev/null
selfserv with PID 67299 found at Tue Nov 27 17:42:54 PST 2012
selfserv with PID 67299 started at Tue Nov 27 17:42:54 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:42:55 PST 2012
ssl.sh: #3088: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67299 at Tue Nov 27 17:42:55 PST 2012
kill -USR1 67299
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67299 killed at Tue Nov 27 17:42:55 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:42:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67357 >/dev/null 2>/dev/null
selfserv with PID 67357 found at Tue Nov 27 17:42:55 PST 2012
selfserv with PID 67357 started at Tue Nov 27 17:42:55 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:42:56 PST 2012
ssl.sh: #3089: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67357 at Tue Nov 27 17:42:56 PST 2012
kill -USR1 67357
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67357 killed at Tue Nov 27 17:42:56 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:42:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67415 >/dev/null 2>/dev/null
selfserv with PID 67415 found at Tue Nov 27 17:42:56 PST 2012
selfserv with PID 67415 started at Tue Nov 27 17:42:56 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:42:56 PST 2012
ssl.sh: #3090: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67415 at Tue Nov 27 17:42:56 PST 2012
kill -USR1 67415
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67415 killed at Tue Nov 27 17:42:56 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:42:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:42:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67473 >/dev/null 2>/dev/null
selfserv with PID 67473 found at Tue Nov 27 17:42:56 PST 2012
selfserv with PID 67473 started at Tue Nov 27 17:42:56 PST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:42:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:42:57 PST 2012
ssl.sh: #3091: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 67473 at Tue Nov 27 17:42:57 PST 2012
kill -USR1 67473
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67473 killed at Tue Nov 27 17:42:57 PST 2012
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the  client
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -fips false -force
FIPS mode disabled.
ssl.sh: #3092:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/client -list
ssl.sh: #3093:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3094:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  client
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -fips false -force
FIPS mode disabled.
ssl.sh: #3095:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/ext_client -list
ssl.sh: #3096:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3097:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Tue Nov 27 17:42:57 PST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Tue Nov 27 17:42:57 PST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Tue Nov 27 17:42:57 PST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 17:42:57 PST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v3.64867 -t Test2 -f ../tests.pw
merge.sh: #3098: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3099: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3100: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3101: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3102: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3103: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:30:48 2012
            Not After : Tue Nov 28 01:30:48 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:25:4b:25:c2:77:6d:b7:c4:7c:50:00:b5:15:5f:12:
                    79:4e:c4:7f:0d:69:37:c7:f9:5a:44:7e:73:fe:bf:62:
                    a6:a1:a0:b7:ad:69:0c:2a:65:cd:89:a9:7c:48:cd:dd:
                    1a:27:cd:2c:84:a3:84:aa:95:e1:be:5c:04:9e:47:55:
                    12:7c:9e:8c:a6:26:ff:5d:67:d1:1d:c9:08:ad:59:0a:
                    b3:aa:32:d8:93:5e:21:c9:32:46:36:cc:6f:51:b7:58:
                    9d:72:16:a9:ca:ba:a5:4b:35:2f:da:ed:67:3a:75:2f:
                    02:8f:ca:a5:6f:c8:1f:69:5a:24:64:6c:95:a8:33:c9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:47:29:69:58:26:4d:f5:ea:31:e2:fa:38:17:52:1f:
        e8:a4:22:77:b5:84:f3:06:f6:01:2c:b4:42:82:1c:af:
        3d:09:aa:cc:fa:84:1b:8a:d2:b9:78:bf:c0:eb:c7:62:
        66:3d:0e:9b:51:50:8f:d8:00:ca:b9:02:ea:7f:85:cc:
        95:93:9f:f1:51:19:01:06:12:8a:1b:5f:ae:55:c3:b5:
        28:68:3c:3e:5c:5c:eb:17:47:8d:a4:9c:6d:1a:b1:34:
        cd:00:98:4f:97:3e:48:8e:7b:db:a0:38:04:39:2f:d9:
        81:6f:36:96:26:5a:55:f5:66:e3:65:09:33:8d:9b:6c
    Fingerprint (MD5):
        CF:EA:46:AD:EB:99:93:F0:32:24:D3:05:5A:F0:56:2E
    Fingerprint (SHA1):
        83:08:55:89:22:5D:C0:2D:00:60:D4:DD:5D:6A:E0:57:39:DB:FF:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3104: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:30:49 2012
            Not After : Tue Nov 28 01:30:49 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:a0:43:5c:2d:ca:21:3b:50:76:82:1b:9c:72:82:1e:
                    26:34:df:27:65:ba:f3:f7:b2:dd:9e:04:3e:07:7f:df:
                    b0:20:ac:6f:b4:57:2a:95:44:59:3a:fc:96:d4:03:1d:
                    4c:01:34:42:79:a8:b4:bf:34:2b:47:43:2b:97:29:28:
                    6a:2c:3f:77:85:9d:5d:07:43:d4:95:f0:5b:f7:89:04:
                    55:ee:8f:d6:3f:5c:8d:23:80:24:49:8e:da:bd:8d:08:
                    df:93:c8:3a:65:d8:7a:d5:6b:bd:b8:9e:ae:84:ac:c3:
                    e1:52:e4:08:81:0d:39:12:40:d5:19:e0:87:56:ee:65
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:00:50:d9:d4:df:5d:d3:21:be:09:2a:8f:e4:45:10:
        6b:bc:c5:cb:62:f2:66:98:ab:fe:51:7b:2c:bb:da:b0:
        e3:37:ca:4e:60:f3:39:57:0b:63:c4:52:4d:03:3d:b7:
        5d:94:db:ce:58:60:f8:52:e1:81:6b:bc:cf:89:64:1c:
        60:2c:d9:8e:f1:f4:cd:0d:0b:27:f3:37:66:51:10:33:
        bb:fe:2d:a2:97:a8:90:9a:48:35:b3:95:0f:0c:d1:9b:
        2e:1a:95:19:15:02:d9:9f:0c:75:57:67:4f:a5:d7:31:
        a3:1f:9e:13:5a:e4:ba:2c:1c:fd:b5:c9:80:fb:c0:2d
    Fingerprint (MD5):
        9A:70:80:84:70:01:10:A3:FB:64:96:6A:74:28:AD:58
    Fingerprint (SHA1):
        77:2D:CE:DE:89:B7:AC:46:E0:90:A4:32:A4:2D:67:3C:12:98:F3:CD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3105: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3106: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice                                                        u,u,u
Alice-ec                                                     u,u,u
Dave                                                         u,u,u
Dave-ec                                                      ,,   
ExtendedSSLUser-ecmixed                                      ,,   
chain-2-clientCA-ec                                          ,,   
chain-2-clientCA                                             ,,   
Alice #1                                                     ,,   
Alice #100                                                   ,,   
nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed          ,,   
Alice #99                                                    ,,   
bob@bogus.com                                                ,,   
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
nss-vm-darwin9-1.community.scl3.mozilla.com                  u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com-ec               ,,   
nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed      ,,   
clientCA-ec                                                  T,C,C
clientCA                                                     T,C,C
Alice #3                                                     ,,   
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 ,,   
nss-vm-darwin9-1-sni.community.scl3.mozilla.com              u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec           ,,   
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           ,,   
serverCA-ec                                                  C,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #2                                                     ,,   
Alice #4                                                     ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v3.64867 -t Test2 -f ../tests.pw
merge.sh: #3107: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests.v1.64867 -t Test1 -f ../tests.pw
merge.sh: #3108: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #3109: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #3110: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #3111: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 01:31:02 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 01:29:37 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 01:31:00 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #3112: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Tue Nov 27 17:43:00 PST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Tue Nov 27 17:43:00 PST 2012
pkits.sh: PKITS data directory /Users/tinderbox/pkits/data/ doesn't exist, skipping.
TIMESTAMP pkits END: Tue Nov 27 17:43:00 PST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 17:43:00 PST 2012
~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/aiahttp ~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/chains
httpserv starting at Tue Nov 27 17:43:00 PST 2012
httpserv -D -p 8556  \
         -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/aiahttp/http_pid.64867  &
trying to connect to httpserv at Tue Nov 27 17:43:00 PST 2012
tstclnt -p 8556 -h nss-vm-darwin9-1.community.scl3.mozilla.com -q -v
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8556 (address=63.245.223.21)
kill -0 67760 >/dev/null 2>/dev/null
httpserv with PID 67760 found at Tue Nov 27 17:43:00 PST 2012
httpserv with PID 67760 started at Tue Nov 27 17:43:00 PST 2012
~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3113: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174301 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3114: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3115: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3116: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174302 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3117: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3118: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3119: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3120: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127174303 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3121: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3122: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127174304 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3123: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3124: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3125: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3126: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3127: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127174305   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3128: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #3129: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3130: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #3131: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #3132: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174302 (0x432f509e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:01 2012
            Not After : Tue Nov 28 01:43:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:03:b5:b7:9a:28:aa:2c:05:d1:e3:36:72:2d:06:03:
                    6e:81:93:ae:ee:aa:5e:b4:15:b9:7f:29:2e:4e:1c:1e:
                    b0:8f:fb:0c:af:36:73:e8:b3:9a:e6:06:4a:de:69:92:
                    c7:b2:50:5e:68:d9:1f:57:df:e4:63:2c:44:0a:14:0a:
                    55:24:10:d6:ba:fb:73:c4:dc:9a:97:08:c4:a1:4b:8e:
                    8f:7c:d1:d5:db:b8:0b:3f:51:43:0d:83:85:97:7f:22:
                    35:7c:6e:b3:18:67:95:f0:38:de:dc:43:b1:7d:16:01:
                    3e:19:aa:e3:fd:57:a4:49:4c:6f:30:e6:c7:4d:f1:2b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:30:3e:01:97:e9:0a:0a:51:e2:e0:10:ac:23:6d:68:
        26:ed:ad:4d:11:25:44:84:b8:be:1a:9e:29:3b:4c:1a:
        3a:d2:ad:ed:ce:0d:f8:3c:b6:d4:50:58:bf:b9:91:00:
        49:df:4a:00:91:09:a8:ea:07:db:66:dc:07:e5:07:52:
        7d:e8:95:1b:1f:39:89:3e:32:79:d2:f6:97:03:1c:df:
        ca:b9:c7:db:ca:3d:11:c8:b8:68:3d:b4:1d:e2:86:ab:
        67:05:ca:39:b5:9f:ad:e9:ac:44:71:58:d6:d3:8a:45:
        ed:f6:b7:eb:15:c7:48:1f:6f:11:e8:c7:29:22:e6:b5
    Fingerprint (MD5):
        3C:14:A1:CE:BB:DC:83:76:6D:AF:66:E1:CD:41:7E:3B
    Fingerprint (SHA1):
        1F:D6:50:53:83:6C:4A:D0:47:4F:F0:9D:C7:03:C7:96:87:4F:F2:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3133: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174301 (0x432f509d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:00 2012
            Not After : Tue Nov 28 01:43:00 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:d4:51:82:82:36:7c:d8:71:5c:90:53:cc:62:b8:81:
                    71:c3:c5:db:fc:e2:2f:a5:58:73:6c:7d:d7:53:da:ee:
                    28:a5:ce:42:0b:9a:d8:a6:4f:ac:6f:a9:5f:7b:2e:f8:
                    07:49:f9:a8:98:c1:c7:56:6e:57:b4:ae:25:d0:73:bd:
                    e1:57:db:a2:6b:6b:e9:7e:74:fd:0f:12:46:34:9b:46:
                    f1:31:7e:7f:44:4e:e0:b3:2d:70:65:84:ad:e9:b2:5e:
                    a5:0e:ba:fe:b2:c5:f3:8f:5b:27:4f:8a:58:02:c0:87:
                    61:91:89:9d:e8:4b:07:cf:59:46:5a:4f:a5:c8:63:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        03:0e:92:3c:58:13:55:9e:49:93:1d:f6:a9:ac:a1:cb:
        1c:f1:98:79:39:7f:2f:63:ad:27:1d:13:5d:e0:b8:b7:
        0f:ca:c2:48:d1:95:b5:bc:88:e8:ac:95:5d:64:96:79:
        69:aa:4e:ec:aa:18:20:f4:5a:53:e4:8b:95:e3:5e:1e:
        3f:8a:56:da:e5:d2:91:1e:ee:f6:f8:9f:2f:f9:2c:d3:
        d0:d1:34:fb:b9:6e:87:81:85:e8:90:66:e2:d7:c0:ce:
        29:4f:cf:a7:55:dc:61:2f:6c:f7:ac:bb:d2:af:a2:99:
        58:c7:73:8a:c0:8c:a1:4c:6b:aa:63:d8:a5:9c:27:dd
    Fingerprint (MD5):
        E3:2E:9C:C7:25:78:D1:6A:04:CD:C0:89:B5:09:6F:16
    Fingerprint (SHA1):
        E9:6E:14:33:34:31:71:F6:54:1B:E0:80:B1:DA:EE:D3:4D:EA:8D:B0

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3134: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3135: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #3136: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #3137: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174301 (0x432f509d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:00 2012
            Not After : Tue Nov 28 01:43:00 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:d4:51:82:82:36:7c:d8:71:5c:90:53:cc:62:b8:81:
                    71:c3:c5:db:fc:e2:2f:a5:58:73:6c:7d:d7:53:da:ee:
                    28:a5:ce:42:0b:9a:d8:a6:4f:ac:6f:a9:5f:7b:2e:f8:
                    07:49:f9:a8:98:c1:c7:56:6e:57:b4:ae:25:d0:73:bd:
                    e1:57:db:a2:6b:6b:e9:7e:74:fd:0f:12:46:34:9b:46:
                    f1:31:7e:7f:44:4e:e0:b3:2d:70:65:84:ad:e9:b2:5e:
                    a5:0e:ba:fe:b2:c5:f3:8f:5b:27:4f:8a:58:02:c0:87:
                    61:91:89:9d:e8:4b:07:cf:59:46:5a:4f:a5:c8:63:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        03:0e:92:3c:58:13:55:9e:49:93:1d:f6:a9:ac:a1:cb:
        1c:f1:98:79:39:7f:2f:63:ad:27:1d:13:5d:e0:b8:b7:
        0f:ca:c2:48:d1:95:b5:bc:88:e8:ac:95:5d:64:96:79:
        69:aa:4e:ec:aa:18:20:f4:5a:53:e4:8b:95:e3:5e:1e:
        3f:8a:56:da:e5:d2:91:1e:ee:f6:f8:9f:2f:f9:2c:d3:
        d0:d1:34:fb:b9:6e:87:81:85:e8:90:66:e2:d7:c0:ce:
        29:4f:cf:a7:55:dc:61:2f:6c:f7:ac:bb:d2:af:a2:99:
        58:c7:73:8a:c0:8c:a1:4c:6b:aa:63:d8:a5:9c:27:dd
    Fingerprint (MD5):
        E3:2E:9C:C7:25:78:D1:6A:04:CD:C0:89:B5:09:6F:16
    Fingerprint (SHA1):
        E9:6E:14:33:34:31:71:F6:54:1B:E0:80:B1:DA:EE:D3:4D:EA:8D:B0

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3138: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174302 (0x432f509e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:01 2012
            Not After : Tue Nov 28 01:43:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:03:b5:b7:9a:28:aa:2c:05:d1:e3:36:72:2d:06:03:
                    6e:81:93:ae:ee:aa:5e:b4:15:b9:7f:29:2e:4e:1c:1e:
                    b0:8f:fb:0c:af:36:73:e8:b3:9a:e6:06:4a:de:69:92:
                    c7:b2:50:5e:68:d9:1f:57:df:e4:63:2c:44:0a:14:0a:
                    55:24:10:d6:ba:fb:73:c4:dc:9a:97:08:c4:a1:4b:8e:
                    8f:7c:d1:d5:db:b8:0b:3f:51:43:0d:83:85:97:7f:22:
                    35:7c:6e:b3:18:67:95:f0:38:de:dc:43:b1:7d:16:01:
                    3e:19:aa:e3:fd:57:a4:49:4c:6f:30:e6:c7:4d:f1:2b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:30:3e:01:97:e9:0a:0a:51:e2:e0:10:ac:23:6d:68:
        26:ed:ad:4d:11:25:44:84:b8:be:1a:9e:29:3b:4c:1a:
        3a:d2:ad:ed:ce:0d:f8:3c:b6:d4:50:58:bf:b9:91:00:
        49:df:4a:00:91:09:a8:ea:07:db:66:dc:07:e5:07:52:
        7d:e8:95:1b:1f:39:89:3e:32:79:d2:f6:97:03:1c:df:
        ca:b9:c7:db:ca:3d:11:c8:b8:68:3d:b4:1d:e2:86:ab:
        67:05:ca:39:b5:9f:ad:e9:ac:44:71:58:d6:d3:8a:45:
        ed:f6:b7:eb:15:c7:48:1f:6f:11:e8:c7:29:22:e6:b5
    Fingerprint (MD5):
        3C:14:A1:CE:BB:DC:83:76:6D:AF:66:E1:CD:41:7E:3B
    Fingerprint (SHA1):
        1F:D6:50:53:83:6C:4A:D0:47:4F:F0:9D:C7:03:C7:96:87:4F:F2:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3139: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #3140: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #3141: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3142: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3143: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3144: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174302 (0x432f509e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:01 2012
            Not After : Tue Nov 28 01:43:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:03:b5:b7:9a:28:aa:2c:05:d1:e3:36:72:2d:06:03:
                    6e:81:93:ae:ee:aa:5e:b4:15:b9:7f:29:2e:4e:1c:1e:
                    b0:8f:fb:0c:af:36:73:e8:b3:9a:e6:06:4a:de:69:92:
                    c7:b2:50:5e:68:d9:1f:57:df:e4:63:2c:44:0a:14:0a:
                    55:24:10:d6:ba:fb:73:c4:dc:9a:97:08:c4:a1:4b:8e:
                    8f:7c:d1:d5:db:b8:0b:3f:51:43:0d:83:85:97:7f:22:
                    35:7c:6e:b3:18:67:95:f0:38:de:dc:43:b1:7d:16:01:
                    3e:19:aa:e3:fd:57:a4:49:4c:6f:30:e6:c7:4d:f1:2b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:30:3e:01:97:e9:0a:0a:51:e2:e0:10:ac:23:6d:68:
        26:ed:ad:4d:11:25:44:84:b8:be:1a:9e:29:3b:4c:1a:
        3a:d2:ad:ed:ce:0d:f8:3c:b6:d4:50:58:bf:b9:91:00:
        49:df:4a:00:91:09:a8:ea:07:db:66:dc:07:e5:07:52:
        7d:e8:95:1b:1f:39:89:3e:32:79:d2:f6:97:03:1c:df:
        ca:b9:c7:db:ca:3d:11:c8:b8:68:3d:b4:1d:e2:86:ab:
        67:05:ca:39:b5:9f:ad:e9:ac:44:71:58:d6:d3:8a:45:
        ed:f6:b7:eb:15:c7:48:1f:6f:11:e8:c7:29:22:e6:b5
    Fingerprint (MD5):
        3C:14:A1:CE:BB:DC:83:76:6D:AF:66:E1:CD:41:7E:3B
    Fingerprint (SHA1):
        1F:D6:50:53:83:6C:4A:D0:47:4F:F0:9D:C7:03:C7:96:87:4F:F2:ED


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3145: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174302 (0x432f509e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:01 2012
            Not After : Tue Nov 28 01:43:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:03:b5:b7:9a:28:aa:2c:05:d1:e3:36:72:2d:06:03:
                    6e:81:93:ae:ee:aa:5e:b4:15:b9:7f:29:2e:4e:1c:1e:
                    b0:8f:fb:0c:af:36:73:e8:b3:9a:e6:06:4a:de:69:92:
                    c7:b2:50:5e:68:d9:1f:57:df:e4:63:2c:44:0a:14:0a:
                    55:24:10:d6:ba:fb:73:c4:dc:9a:97:08:c4:a1:4b:8e:
                    8f:7c:d1:d5:db:b8:0b:3f:51:43:0d:83:85:97:7f:22:
                    35:7c:6e:b3:18:67:95:f0:38:de:dc:43:b1:7d:16:01:
                    3e:19:aa:e3:fd:57:a4:49:4c:6f:30:e6:c7:4d:f1:2b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:30:3e:01:97:e9:0a:0a:51:e2:e0:10:ac:23:6d:68:
        26:ed:ad:4d:11:25:44:84:b8:be:1a:9e:29:3b:4c:1a:
        3a:d2:ad:ed:ce:0d:f8:3c:b6:d4:50:58:bf:b9:91:00:
        49:df:4a:00:91:09:a8:ea:07:db:66:dc:07:e5:07:52:
        7d:e8:95:1b:1f:39:89:3e:32:79:d2:f6:97:03:1c:df:
        ca:b9:c7:db:ca:3d:11:c8:b8:68:3d:b4:1d:e2:86:ab:
        67:05:ca:39:b5:9f:ad:e9:ac:44:71:58:d6:d3:8a:45:
        ed:f6:b7:eb:15:c7:48:1f:6f:11:e8:c7:29:22:e6:b5
    Fingerprint (MD5):
        3C:14:A1:CE:BB:DC:83:76:6D:AF:66:E1:CD:41:7E:3B
    Fingerprint (SHA1):
        1F:D6:50:53:83:6C:4A:D0:47:4F:F0:9D:C7:03:C7:96:87:4F:F2:ED


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3146: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #3147: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #3148: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3149: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3150: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3151: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174301 (0x432f509d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:00 2012
            Not After : Tue Nov 28 01:43:00 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:d4:51:82:82:36:7c:d8:71:5c:90:53:cc:62:b8:81:
                    71:c3:c5:db:fc:e2:2f:a5:58:73:6c:7d:d7:53:da:ee:
                    28:a5:ce:42:0b:9a:d8:a6:4f:ac:6f:a9:5f:7b:2e:f8:
                    07:49:f9:a8:98:c1:c7:56:6e:57:b4:ae:25:d0:73:bd:
                    e1:57:db:a2:6b:6b:e9:7e:74:fd:0f:12:46:34:9b:46:
                    f1:31:7e:7f:44:4e:e0:b3:2d:70:65:84:ad:e9:b2:5e:
                    a5:0e:ba:fe:b2:c5:f3:8f:5b:27:4f:8a:58:02:c0:87:
                    61:91:89:9d:e8:4b:07:cf:59:46:5a:4f:a5:c8:63:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        03:0e:92:3c:58:13:55:9e:49:93:1d:f6:a9:ac:a1:cb:
        1c:f1:98:79:39:7f:2f:63:ad:27:1d:13:5d:e0:b8:b7:
        0f:ca:c2:48:d1:95:b5:bc:88:e8:ac:95:5d:64:96:79:
        69:aa:4e:ec:aa:18:20:f4:5a:53:e4:8b:95:e3:5e:1e:
        3f:8a:56:da:e5:d2:91:1e:ee:f6:f8:9f:2f:f9:2c:d3:
        d0:d1:34:fb:b9:6e:87:81:85:e8:90:66:e2:d7:c0:ce:
        29:4f:cf:a7:55:dc:61:2f:6c:f7:ac:bb:d2:af:a2:99:
        58:c7:73:8a:c0:8c:a1:4c:6b:aa:63:d8:a5:9c:27:dd
    Fingerprint (MD5):
        E3:2E:9C:C7:25:78:D1:6A:04:CD:C0:89:B5:09:6F:16
    Fingerprint (SHA1):
        E9:6E:14:33:34:31:71:F6:54:1B:E0:80:B1:DA:EE:D3:4D:EA:8D:B0


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3152: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174301 (0x432f509d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:00 2012
            Not After : Tue Nov 28 01:43:00 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:d4:51:82:82:36:7c:d8:71:5c:90:53:cc:62:b8:81:
                    71:c3:c5:db:fc:e2:2f:a5:58:73:6c:7d:d7:53:da:ee:
                    28:a5:ce:42:0b:9a:d8:a6:4f:ac:6f:a9:5f:7b:2e:f8:
                    07:49:f9:a8:98:c1:c7:56:6e:57:b4:ae:25:d0:73:bd:
                    e1:57:db:a2:6b:6b:e9:7e:74:fd:0f:12:46:34:9b:46:
                    f1:31:7e:7f:44:4e:e0:b3:2d:70:65:84:ad:e9:b2:5e:
                    a5:0e:ba:fe:b2:c5:f3:8f:5b:27:4f:8a:58:02:c0:87:
                    61:91:89:9d:e8:4b:07:cf:59:46:5a:4f:a5:c8:63:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        03:0e:92:3c:58:13:55:9e:49:93:1d:f6:a9:ac:a1:cb:
        1c:f1:98:79:39:7f:2f:63:ad:27:1d:13:5d:e0:b8:b7:
        0f:ca:c2:48:d1:95:b5:bc:88:e8:ac:95:5d:64:96:79:
        69:aa:4e:ec:aa:18:20:f4:5a:53:e4:8b:95:e3:5e:1e:
        3f:8a:56:da:e5:d2:91:1e:ee:f6:f8:9f:2f:f9:2c:d3:
        d0:d1:34:fb:b9:6e:87:81:85:e8:90:66:e2:d7:c0:ce:
        29:4f:cf:a7:55:dc:61:2f:6c:f7:ac:bb:d2:af:a2:99:
        58:c7:73:8a:c0:8c:a1:4c:6b:aa:63:d8:a5:9c:27:dd
    Fingerprint (MD5):
        E3:2E:9C:C7:25:78:D1:6A:04:CD:C0:89:B5:09:6F:16
    Fingerprint (SHA1):
        E9:6E:14:33:34:31:71:F6:54:1B:E0:80:B1:DA:EE:D3:4D:EA:8D:B0


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3153: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #3154: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174306 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3155: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #3156: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #3157: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174307 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3158: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #3159: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #3160: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174308 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3161: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #3162: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #3163: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174309 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3164: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #3165: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #3166: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174310 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3167: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #3168: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #3169: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174311 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3170: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #3171: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #3172: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174312 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3173: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #3174: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #3175: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174313 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3176: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #3177: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #3178: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174314 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3179: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #3180: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #3181: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o Bridge11Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3182: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127174315 -7 Bridge11@Root1  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3183: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #3184: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127174316 -7 Bridge11@Root2  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3185: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #3186: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127174317 -7 Bridge11@Root3  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3187: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #3188: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #3189: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #3190: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o Bridge12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3191: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127174318 -7 Bridge12@Root4  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3192: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #3193: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127174319 -7 Bridge12@Root5  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3194: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #3195: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127174320 -7 Bridge12@Root6  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3196: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #3197: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #3198: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #3199: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o Bridge13Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3200: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127174321 -7 Bridge13@Root7  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3201: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #3202: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127174322 -7 Bridge13@Root8  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3203: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #3204: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127174323 -7 Bridge13@Root9  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3205: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #3206: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #3207: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #3208: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o Bridge21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3209: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127174324 -7 Bridge21@Bridge11  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3210: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #3211: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127174325 -7 Bridge21@Bridge12  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3212: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #3213: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127174326 -7 Bridge21@Bridge13  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3214: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #3215: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #3216: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3217: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3218: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127174327   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3219: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #3220: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3221: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3222: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127174328   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3223: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3224: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174306 (0x432f50a2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:06 2012
            Not After : Tue Nov 28 01:43:06 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:ae:48:6a:61:a2:e0:c8:d5:a2:c1:da:2d:24:d6:24:
                    6e:d0:44:fe:72:ce:89:05:c0:07:03:0f:bc:32:21:7c:
                    d3:f4:ba:bd:06:0f:e8:69:3f:68:16:04:b4:02:3a:d8:
                    a6:72:28:30:a5:48:52:ea:57:19:9c:cd:b2:ac:88:ce:
                    98:0b:25:a9:d3:4d:68:ee:f9:b6:13:a2:40:cd:f1:1c:
                    60:a8:ef:84:cc:c3:8e:08:ec:13:6d:af:43:41:5d:fd:
                    b6:81:cf:bd:e7:de:df:38:00:e1:88:c7:f5:07:4e:45:
                    93:53:67:b2:6c:ca:80:26:14:ef:98:ea:fd:7b:c8:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:62:62:09:e5:9e:17:e3:70:cc:4a:58:0d:ea:bf:05:
        67:62:3b:41:ef:97:3a:5f:04:e2:ba:1a:c0:de:9f:5e:
        3d:29:f3:06:1a:8b:b3:fb:ca:40:9a:34:74:57:17:70:
        54:58:45:50:30:0a:c6:d6:21:d1:94:80:bc:8d:fd:bf:
        8a:54:2c:26:58:a5:b8:33:5a:be:71:af:a0:a8:d8:3f:
        c6:1b:4d:7c:31:2e:d8:06:91:db:34:c8:8e:47:fe:8f:
        21:0f:a9:99:eb:60:ad:5f:e3:96:93:6d:aa:63:11:78:
        43:ba:63:16:1a:21:59:f4:d9:aa:7c:7d:42:86:ea:d0
    Fingerprint (MD5):
        62:B6:21:2F:FD:E2:16:CD:A4:BB:D0:6B:1E:9C:6E:1A
    Fingerprint (SHA1):
        CD:6A:06:D3:3A:1D:50:CE:CE:FA:FD:93:6E:AB:D0:6F:4F:C0:B5:8E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3225: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174307 (0x432f50a3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:06 2012
            Not After : Tue Nov 28 01:43:06 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:43:a2:4e:e4:8d:57:a4:66:8f:35:b1:07:70:fa:4a:
                    71:96:3a:12:fc:45:2a:08:6a:02:95:83:f9:11:ee:0e:
                    a7:e5:ed:df:38:02:02:d1:fd:5d:b4:2f:e2:34:80:19:
                    08:f2:e8:50:4c:fd:4e:7f:71:c0:e6:c8:44:d7:d1:cb:
                    b8:5f:59:3d:bc:45:76:06:0a:e9:e7:97:bd:63:5a:fe:
                    ab:a6:99:c5:bf:8a:b4:6b:47:08:23:55:b6:d5:c8:b4:
                    0a:97:77:cb:4f:bd:62:f4:56:db:55:cd:03:7a:bf:50:
                    ef:ca:7a:1f:27:58:28:2c:d9:70:2b:08:bb:af:76:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        73:64:f3:16:39:10:0f:a2:29:36:7a:da:58:0c:6c:c5:
        ff:a7:8d:93:30:58:e6:00:35:ce:ce:c0:38:ea:0f:0d:
        48:4a:74:79:b1:73:80:b3:eb:95:2e:9b:86:88:88:e3:
        e8:6c:3b:a6:d5:95:eb:6d:a8:54:60:af:f4:d3:7b:30:
        69:6f:b4:9e:2c:e1:a2:5a:b4:5f:1b:fb:33:03:7a:49:
        e2:ff:2f:61:72:50:cd:b8:eb:94:d7:09:7d:fd:4b:b7:
        58:ca:5f:dd:f0:2a:5a:79:cb:29:ac:63:49:32:40:05:
        70:46:e2:f5:2b:63:ec:99:40:09:c7:6a:73:2a:0a:76
    Fingerprint (MD5):
        D2:54:1B:85:9F:64:3C:8D:50:ED:D1:1A:3A:AE:D8:5A
    Fingerprint (SHA1):
        52:72:F1:79:02:B7:15:E3:93:AB:EB:81:36:9E:C1:CA:8E:57:DC:B6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3226: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174308 (0x432f50a4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:07 2012
            Not After : Tue Nov 28 01:43:07 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:e8:a3:20:16:6d:55:2b:90:b7:c8:63:72:d1:e8:19:
                    c8:24:25:07:c8:4c:94:43:24:8b:9d:32:09:fa:19:b2:
                    72:5f:c7:26:9d:e7:15:0d:ba:d4:8d:20:1d:fe:18:0c:
                    71:ab:fb:c4:fe:67:83:b5:09:64:86:3e:d2:8c:2b:14:
                    6d:d3:81:01:c9:a6:41:b4:80:04:dd:93:e8:16:87:33:
                    24:0d:ef:f7:6f:02:e8:9d:3c:d4:f0:f5:86:9a:9e:fa:
                    b5:13:be:75:b0:aa:3c:bc:9c:5e:86:0f:79:4b:a2:01:
                    32:62:c8:42:6e:5f:0b:03:63:17:92:24:09:3c:d7:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:5e:43:be:92:68:22:9f:76:84:a0:f8:cc:b8:ae:d3:
        18:f7:70:f4:fb:8f:6a:9b:e0:56:22:69:b9:63:25:c1:
        ed:67:27:4b:25:39:74:d1:df:33:53:7e:df:0f:bb:7c:
        c5:98:20:06:66:3e:a9:82:11:a7:6a:86:1b:81:04:6c:
        01:d2:1c:9d:5b:05:70:1e:19:15:ce:c3:6d:7b:0b:36:
        05:1b:49:ba:8e:08:af:77:78:de:4e:51:23:0d:cc:99:
        b3:bc:ba:73:fc:18:06:23:f3:36:b9:90:85:38:c5:5c:
        3d:dd:e3:f5:5b:90:a1:fe:50:87:6f:0c:71:b1:03:20
    Fingerprint (MD5):
        06:57:98:D8:FB:3E:A6:FA:F2:16:64:77:08:0C:EB:D5
    Fingerprint (SHA1):
        B3:F4:E4:1B:EF:F0:6B:17:BA:31:DC:21:EF:79:50:D2:B4:89:E8:32


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3227: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174309 (0x432f50a5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:07 2012
            Not After : Tue Nov 28 01:43:07 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:75:0b:12:07:ef:68:b7:80:cb:07:c1:00:6c:79:ed:
                    e7:07:5a:44:09:d0:c2:ae:ea:2e:a8:5e:40:9b:cd:03:
                    de:a3:17:92:48:42:52:ba:63:09:50:40:47:96:12:13:
                    ee:53:50:d6:50:5b:2a:d4:f3:45:2d:16:10:04:ad:53:
                    2f:f7:4f:41:5b:66:2f:c9:23:10:f3:a1:ab:8f:4e:2c:
                    37:0d:bb:77:55:f8:bf:da:68:83:db:a1:88:38:ea:9d:
                    ec:27:3b:df:89:12:3a:e7:8d:e7:c1:16:5e:3e:8a:ac:
                    3c:ba:63:5c:70:e1:37:53:a4:78:22:b3:90:45:b2:8f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bd:c7:7f:c3:13:71:7b:d6:30:2e:81:66:7f:7f:89:eb:
        48:de:b7:a0:b4:a2:27:38:f8:45:22:d5:3b:4b:36:39:
        3a:dd:42:87:99:3f:ce:07:46:ac:6d:91:ba:cc:94:3d:
        5c:bf:92:9c:9d:85:ee:08:62:0d:de:98:34:40:16:82:
        13:96:50:12:dd:50:73:a2:99:6d:ed:0a:45:80:99:a8:
        7e:9d:68:0e:d0:4d:72:55:06:2e:59:2c:5d:2a:9b:55:
        17:2f:6c:73:78:7e:29:e8:98:73:b4:ca:04:e2:63:67:
        8e:d4:8d:b8:4b:8d:8e:d5:60:86:c0:b0:e5:05:4e:9a
    Fingerprint (MD5):
        12:9B:18:43:7A:72:CE:91:36:CC:69:EB:20:66:C8:B7
    Fingerprint (SHA1):
        17:CB:0F:AD:B6:84:B6:91:73:B5:43:4F:1E:D9:55:57:B2:3C:05:36


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3228: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174310 (0x432f50a6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:08 2012
            Not After : Tue Nov 28 01:43:08 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:0a:21:bb:39:a2:a4:44:75:87:0c:d4:c5:6c:8b:d2:
                    27:4f:6f:21:88:4c:a2:df:8c:a4:c3:e5:f9:0c:47:2a:
                    d6:a6:0c:46:6e:bb:74:fe:42:2c:2d:41:1a:aa:6f:78:
                    f3:62:fe:85:bc:5b:5f:41:30:25:72:f7:e6:ba:f3:76:
                    70:99:dc:48:53:9e:59:fe:81:38:18:c5:3c:bd:5f:69:
                    46:4c:a2:8f:7d:7b:0b:30:22:33:ca:c1:41:c7:ee:c6:
                    10:83:52:cf:81:ce:c1:37:33:39:c8:60:99:56:55:a8:
                    a0:c8:80:b6:06:08:0b:df:27:49:80:89:08:ff:75:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:b6:39:31:1b:de:ab:cd:6f:9c:45:be:ce:67:3f:4d:
        b0:09:63:7c:2c:36:50:9e:d2:ea:f1:cf:ce:e3:ef:98:
        69:73:a6:89:90:b8:e7:08:fc:39:cc:d9:fc:25:d3:89:
        ea:71:7b:2e:7c:75:22:bc:bd:6a:5d:1f:9b:fc:dd:28:
        74:9f:2e:5b:df:a4:8c:5a:7a:7f:f6:a1:c6:db:10:07:
        5b:9a:43:59:09:9f:bf:67:0f:db:75:ca:43:00:2f:cc:
        7f:a7:12:a4:9a:64:54:0b:0b:ff:bf:e8:4d:67:da:5d:
        92:83:76:6c:2a:da:59:7c:c2:e4:8a:b5:99:6e:55:57
    Fingerprint (MD5):
        1D:22:8C:9B:84:BF:6F:47:9E:1A:AA:8A:D5:9E:B3:40
    Fingerprint (SHA1):
        83:E2:54:67:2E:FE:C0:D0:51:04:E0:A5:67:AB:3C:44:C4:EC:F8:C9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3229: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174311 (0x432f50a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:08 2012
            Not After : Tue Nov 28 01:43:08 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:b2:4d:9f:fd:32:37:97:c5:0d:2d:7f:35:8c:a3:da:
                    27:54:60:8f:3a:9a:bf:3e:d9:65:93:89:2a:ed:8c:57:
                    7c:c4:60:6f:81:2d:48:cf:4e:08:b7:62:de:13:81:63:
                    fa:5e:24:31:38:db:4e:04:3d:11:8c:c3:ee:b8:28:d2:
                    a0:32:93:9c:b8:74:41:c2:d4:b6:23:f5:79:ba:f5:7a:
                    ec:b1:aa:73:34:93:83:4c:17:7a:a4:96:c0:20:7f:35:
                    9f:f5:64:45:07:20:79:d0:25:49:e7:bd:eb:8e:7a:97:
                    55:5d:6d:be:98:97:f0:04:12:9a:33:74:99:bf:b5:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        75:b9:b1:68:c1:b3:bd:ed:77:ff:88:2f:35:17:32:b7:
        41:bb:be:b2:43:6d:3e:f7:88:92:a5:ae:3b:bc:af:0a:
        bf:f0:82:0d:11:07:89:74:5d:44:54:b4:e4:54:b4:d8:
        44:fb:6a:d1:cf:d6:39:c6:cc:a1:b5:a0:b3:4d:56:20:
        99:c4:cd:c4:47:3a:dd:6f:f6:d4:4d:96:7d:33:14:eb:
        78:04:c4:09:d2:0a:95:51:55:7a:a0:07:f0:9c:8d:69:
        f2:bc:6d:40:65:1c:e3:56:6e:cf:9a:6e:c1:26:17:23:
        a8:16:d7:91:39:03:42:3b:58:84:b5:0e:a6:9e:73:2a
    Fingerprint (MD5):
        81:3D:01:93:25:46:0D:94:9B:C2:A9:D9:B4:59:E3:A0
    Fingerprint (SHA1):
        4C:13:A2:22:C3:2A:8B:FF:72:D0:19:CD:5B:1B:ED:C0:82:FD:86:D2


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3230: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174312 (0x432f50a8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:09 2012
            Not After : Tue Nov 28 01:43:09 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:08:67:32:0a:d9:76:af:6f:33:af:92:cf:d7:2b:cc:
                    eb:b2:1a:d8:91:b0:60:c3:a5:e4:f6:e6:56:74:8b:08:
                    93:c9:49:b4:7a:98:8b:03:e4:cb:f3:85:05:3a:61:81:
                    59:fb:75:4d:68:4a:1a:94:c1:18:9d:1a:01:e0:16:eb:
                    91:7f:74:c0:b6:50:5c:eb:d3:49:6a:d0:f7:92:37:85:
                    f2:11:ee:f6:67:41:9f:62:09:bb:f4:b2:78:4e:15:54:
                    89:f1:7e:ff:bc:6c:0d:06:0d:16:82:c2:b1:ed:55:47:
                    e9:8d:fe:88:f0:a9:17:3d:32:68:ad:47:82:d5:80:31
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        82:cd:51:00:8a:44:cb:85:c7:aa:b4:4e:d9:c6:57:5c:
        ef:6c:b4:ae:9d:5b:2c:05:26:58:c1:90:17:35:19:cb:
        16:a5:75:19:41:8c:0c:01:a1:db:af:3a:16:80:9a:3b:
        a0:6a:f9:3d:9b:52:83:6d:1e:c4:41:70:7f:2f:8c:a3:
        c8:bf:bf:73:22:2f:86:2d:c3:2e:bc:26:fe:fc:e5:c8:
        b6:f0:1e:ff:3f:c0:93:ad:1f:c0:d5:4d:77:a0:91:ef:
        a8:3e:3c:7d:a7:62:cc:67:e4:68:74:fa:b5:e4:f4:a9:
        8b:54:c6:f6:43:c0:77:6a:60:11:a6:ba:ef:65:67:39
    Fingerprint (MD5):
        F5:37:48:0B:FE:A6:2B:66:9F:1C:FE:07:00:94:52:11
    Fingerprint (SHA1):
        CB:16:C2:EE:FA:55:DB:BF:74:BC:BB:4D:3E:5A:3E:DC:17:73:D6:E4


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3231: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174313 (0x432f50a9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:09 2012
            Not After : Tue Nov 28 01:43:09 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:de:13:3c:06:8f:31:be:63:9e:2a:49:29:96:fc:3e:
                    6c:c7:db:ab:0c:7d:c3:a1:51:fd:7b:16:ba:1d:76:58:
                    9e:ff:20:0b:4c:c4:3e:04:8b:40:6e:a3:cc:af:8f:4b:
                    51:6b:57:ce:49:8c:15:f3:ed:19:ab:b3:65:90:46:df:
                    a1:04:2e:66:04:1e:33:ff:9f:79:77:24:95:5a:c8:54:
                    2b:23:8d:e1:eb:fd:ab:9f:e9:2b:af:e9:ab:83:b2:81:
                    fc:40:6f:d2:d0:13:1d:97:26:b6:56:57:5a:21:14:09:
                    79:7b:13:a0:f1:d2:4d:eb:ce:25:01:73:7f:bf:8e:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8f:cb:98:f9:75:0a:5a:ab:65:b1:04:33:31:14:fc:77:
        10:7e:37:57:29:81:5b:a0:aa:90:1b:d9:95:a5:08:fc:
        05:da:5d:0d:4d:d8:9f:5c:65:8c:89:a3:94:cc:df:48:
        95:b8:67:af:9f:8b:d0:5c:6f:55:79:a7:35:b3:e9:84:
        5f:cd:0d:ff:6f:0c:03:48:cd:1e:22:d0:70:33:c4:a7:
        9d:ca:62:92:1f:39:70:c9:57:45:5a:7e:11:72:b7:a9:
        7c:7a:ad:36:11:b5:53:87:73:56:57:eb:93:50:86:19:
        23:ca:21:20:5f:b7:5f:cf:c6:83:77:a1:94:dc:31:50
    Fingerprint (MD5):
        F5:DF:05:6F:D9:C3:85:3A:E9:F0:E6:AF:4F:F3:68:D1
    Fingerprint (SHA1):
        D2:A7:C5:0C:95:49:75:0B:D1:8F:16:7E:B2:89:41:C3:CD:02:F0:49


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3232: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174314 (0x432f50aa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:10 2012
            Not After : Tue Nov 28 01:43:10 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:02:8f:b5:bc:19:34:e7:04:0f:8b:ba:5e:9a:98:79:
                    1e:7c:31:a5:a3:22:d2:bc:f0:bd:3e:5b:27:59:c4:02:
                    35:21:7d:ec:4a:fa:2d:e2:78:8d:2a:f2:c3:99:59:e7:
                    95:32:29:6d:5c:24:67:bd:08:38:63:fe:f6:36:9d:dc:
                    8a:6d:2b:40:eb:3e:56:fb:50:fd:e6:22:10:56:08:52:
                    ed:a3:7c:2e:90:1c:f6:f0:25:08:2a:29:49:50:3f:eb:
                    27:ed:dc:6f:3e:36:96:44:12:82:2b:3a:f6:20:dd:01:
                    99:75:09:03:ed:5e:bf:c0:c8:90:12:dc:c8:d6:42:49
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        81:fc:d5:e5:70:5b:80:e0:4c:73:b1:c4:a6:d9:88:56:
        60:59:e8:06:cd:05:ea:6d:a8:fd:70:0b:6b:4f:8b:38:
        27:84:5b:31:80:e9:77:8b:58:0b:3a:9d:70:16:16:7c:
        79:74:45:9b:3a:16:e8:4c:67:1e:21:08:6d:d2:2b:06:
        17:f8:48:81:33:97:ad:e7:90:1f:c9:f1:90:20:93:e3:
        53:d6:40:84:7f:79:26:6e:e5:af:0d:de:0d:b2:2d:0b:
        6a:1c:71:4a:cf:2e:0f:f8:6e:5c:ff:8a:0b:cd:92:c1:
        d8:0f:4c:b9:b0:63:05:db:49:dd:ee:3c:88:dc:ba:01
    Fingerprint (MD5):
        BA:3F:04:D6:23:84:C9:9D:45:5F:98:4A:F9:4D:C5:FF
    Fingerprint (SHA1):
        45:19:8E:15:C1:49:8B:7A:37:B1:10:82:5B:7D:19:F3:BB:02:A2:98


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3233: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3234: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174329 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3235: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3236: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3237: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3238: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127174330   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3239: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3240: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3241: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3242: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127174331   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3243: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3244: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3245: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3246: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127174332   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3247: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3248: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3249: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174329 (0x432f50b9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:18 2012
            Not After : Tue Nov 28 01:43:18 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:2e:13:2b:6b:62:64:33:2a:24:ec:0b:22:a5:39:48:
                    ba:0b:83:ab:b9:5e:a0:76:d1:a4:f0:68:fe:d8:3a:56:
                    df:37:b6:18:eb:15:ca:e1:87:15:b9:f3:b2:4c:1b:86:
                    31:d8:72:99:6f:4c:97:a2:99:cd:64:a3:45:74:8e:4d:
                    cd:8c:9d:5b:1d:66:6e:27:5c:6e:26:49:e2:7e:33:25:
                    34:cc:7c:19:aa:6a:ee:65:51:6e:d9:c2:1f:97:94:76:
                    49:9b:96:ab:6e:c1:4e:29:c3:16:6c:04:f7:86:a0:9d:
                    35:06:c9:1e:70:5b:fb:7b:de:6b:29:e5:a8:1e:3c:8b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ea:95:a7:26:53:cd:00:f5:f8:57:5e:5e:bb:92:35:
        b1:41:0e:e5:f7:34:3d:3f:3f:11:37:b8:d6:22:c2:f6:
        dd:27:9a:8a:a3:1a:f4:bb:42:1f:61:b0:59:93:9d:c7:
        99:78:2c:97:fe:63:1b:a3:16:49:f3:61:a2:07:ff:97:
        63:eb:6f:cc:72:21:e3:3c:3d:a4:bf:95:80:ff:26:a6:
        13:ca:d3:26:89:c4:3d:7f:14:62:4a:cb:8f:13:2f:db:
        2b:73:ab:df:9a:c1:06:5d:7e:c3:9e:cb:82:bd:40:e5:
        9d:27:79:68:2b:d8:bd:dd:b1:82:1a:2a:5a:d1:c0:23
    Fingerprint (MD5):
        28:E5:57:E2:1F:95:A1:7E:E2:09:CD:71:D6:BD:25:18
    Fingerprint (SHA1):
        CC:3C:34:8B:57:27:A4:43:05:9E:4B:21:DC:80:66:D4:B2:55:DC:ED


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3250: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3251: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174330 (0x432f50ba)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:18 2012
            Not After : Tue Nov 28 01:43:18 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:7b:90:3b:b2:f2:25:11:03:9b:9f:fd:a0:62:ab:92:
                    f0:8e:a4:af:6b:62:2c:8f:64:2d:f8:69:6c:b5:1a:c7:
                    ba:4b:29:27:f3:d1:b3:52:9a:f3:25:8f:1f:5c:a9:4b:
                    83:92:23:ca:83:47:11:33:be:e0:3e:49:dc:01:48:b9:
                    89:ae:c1:73:69:34:d2:82:95:f0:58:67:91:18:8d:29:
                    5c:b9:d8:ec:54:93:6e:d5:dc:5e:17:5f:97:d4:9c:aa:
                    e8:fd:58:44:e4:f4:80:07:fa:21:2f:97:c8:82:40:73:
                    44:7c:f6:bd:c7:19:4b:32:3e:a2:10:69:91:bf:5f:c7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        48:8a:4b:9b:63:47:22:fb:05:33:0a:6a:cc:df:08:15:
        d0:58:c3:db:eb:60:cc:03:24:1b:e2:a9:ea:ba:b3:e3:
        d3:8a:06:8e:2d:8a:eb:6f:c4:21:59:15:87:d8:24:5e:
        d1:02:d3:02:5a:84:d4:11:a5:cb:5f:da:62:f8:20:6d:
        bd:bd:3c:37:4d:ab:d0:33:e8:16:7d:86:bd:60:4e:7f:
        b9:4c:c2:fd:5a:a4:78:ba:86:0a:83:ae:56:41:57:ea:
        35:bc:aa:f9:7f:89:e8:12:48:8f:23:5e:cc:62:72:93:
        ff:44:5d:2a:2b:cb:71:fe:b8:fa:a6:bf:bd:7e:02:0c
    Fingerprint (MD5):
        27:5C:31:BF:F6:2A:3E:B8:9A:F0:B4:60:43:70:42:0C
    Fingerprint (SHA1):
        2D:29:7B:B1:A4:8B:1A:BD:46:53:6A:CC:61:B3:F8:F3:24:6C:0F:C1


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3252: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3253: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174331 (0x432f50bb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:19 2012
            Not After : Tue Nov 28 01:43:19 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:eb:9d:6c:34:d8:13:57:a7:99:d5:83:83:18:dd:bd:
                    e1:0b:72:a1:66:eb:10:c9:2d:a1:73:97:9f:de:c9:47:
                    e3:b9:d8:6a:48:4e:65:89:a9:f4:ad:a9:ba:1e:ef:e7:
                    a2:7f:fd:e6:43:80:e2:2b:b1:44:18:1f:cf:93:78:f2:
                    f4:a0:7b:1e:80:3d:5c:04:a8:a1:05:5f:77:9f:2f:b2:
                    1b:0b:b0:cf:25:4a:eb:b5:ea:c1:41:70:0f:d1:b9:19:
                    02:57:00:f4:95:43:95:2a:50:bb:85:91:64:89:90:48:
                    7d:2a:eb:88:1b:6a:7d:67:d1:e3:1e:a5:f2:b8:0e:87
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        56:6d:e0:e7:7b:aa:9f:9b:34:b9:e8:b3:a1:64:cb:91:
        dc:43:5f:02:95:e2:f3:bc:37:0b:5c:d8:07:5a:2c:82:
        4d:ea:bb:b2:25:25:66:0e:0d:58:2a:fc:73:db:3d:c6:
        2f:4c:79:ba:06:22:4e:3d:6d:d5:89:13:e0:9d:67:81:
        c9:6e:88:ac:85:d8:8c:7f:fe:1d:e1:21:7a:25:1e:72:
        ff:bc:a3:be:f4:53:2e:4f:72:5c:17:ee:3f:86:be:5f:
        38:ed:61:0d:43:e7:3d:4b:e3:1f:bf:fe:96:80:97:d0:
        15:02:09:95:a1:6a:b0:85:a2:2e:56:99:9c:a3:1e:c0
    Fingerprint (MD5):
        DE:FF:98:9E:58:86:8E:4E:EE:56:3F:36:B3:EE:78:0D
    Fingerprint (SHA1):
        5C:3F:0F:F0:6A:01:06:F4:EF:DA:22:1C:22:A6:F3:1F:95:DF:E9:5B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3254: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3255: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3256: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3257: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3258: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174329 (0x432f50b9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:18 2012
            Not After : Tue Nov 28 01:43:18 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:2e:13:2b:6b:62:64:33:2a:24:ec:0b:22:a5:39:48:
                    ba:0b:83:ab:b9:5e:a0:76:d1:a4:f0:68:fe:d8:3a:56:
                    df:37:b6:18:eb:15:ca:e1:87:15:b9:f3:b2:4c:1b:86:
                    31:d8:72:99:6f:4c:97:a2:99:cd:64:a3:45:74:8e:4d:
                    cd:8c:9d:5b:1d:66:6e:27:5c:6e:26:49:e2:7e:33:25:
                    34:cc:7c:19:aa:6a:ee:65:51:6e:d9:c2:1f:97:94:76:
                    49:9b:96:ab:6e:c1:4e:29:c3:16:6c:04:f7:86:a0:9d:
                    35:06:c9:1e:70:5b:fb:7b:de:6b:29:e5:a8:1e:3c:8b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ea:95:a7:26:53:cd:00:f5:f8:57:5e:5e:bb:92:35:
        b1:41:0e:e5:f7:34:3d:3f:3f:11:37:b8:d6:22:c2:f6:
        dd:27:9a:8a:a3:1a:f4:bb:42:1f:61:b0:59:93:9d:c7:
        99:78:2c:97:fe:63:1b:a3:16:49:f3:61:a2:07:ff:97:
        63:eb:6f:cc:72:21:e3:3c:3d:a4:bf:95:80:ff:26:a6:
        13:ca:d3:26:89:c4:3d:7f:14:62:4a:cb:8f:13:2f:db:
        2b:73:ab:df:9a:c1:06:5d:7e:c3:9e:cb:82:bd:40:e5:
        9d:27:79:68:2b:d8:bd:dd:b1:82:1a:2a:5a:d1:c0:23
    Fingerprint (MD5):
        28:E5:57:E2:1F:95:A1:7E:E2:09:CD:71:D6:BD:25:18
    Fingerprint (SHA1):
        CC:3C:34:8B:57:27:A4:43:05:9E:4B:21:DC:80:66:D4:B2:55:DC:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3259: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3260: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174330 (0x432f50ba)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:18 2012
            Not After : Tue Nov 28 01:43:18 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:7b:90:3b:b2:f2:25:11:03:9b:9f:fd:a0:62:ab:92:
                    f0:8e:a4:af:6b:62:2c:8f:64:2d:f8:69:6c:b5:1a:c7:
                    ba:4b:29:27:f3:d1:b3:52:9a:f3:25:8f:1f:5c:a9:4b:
                    83:92:23:ca:83:47:11:33:be:e0:3e:49:dc:01:48:b9:
                    89:ae:c1:73:69:34:d2:82:95:f0:58:67:91:18:8d:29:
                    5c:b9:d8:ec:54:93:6e:d5:dc:5e:17:5f:97:d4:9c:aa:
                    e8:fd:58:44:e4:f4:80:07:fa:21:2f:97:c8:82:40:73:
                    44:7c:f6:bd:c7:19:4b:32:3e:a2:10:69:91:bf:5f:c7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        48:8a:4b:9b:63:47:22:fb:05:33:0a:6a:cc:df:08:15:
        d0:58:c3:db:eb:60:cc:03:24:1b:e2:a9:ea:ba:b3:e3:
        d3:8a:06:8e:2d:8a:eb:6f:c4:21:59:15:87:d8:24:5e:
        d1:02:d3:02:5a:84:d4:11:a5:cb:5f:da:62:f8:20:6d:
        bd:bd:3c:37:4d:ab:d0:33:e8:16:7d:86:bd:60:4e:7f:
        b9:4c:c2:fd:5a:a4:78:ba:86:0a:83:ae:56:41:57:ea:
        35:bc:aa:f9:7f:89:e8:12:48:8f:23:5e:cc:62:72:93:
        ff:44:5d:2a:2b:cb:71:fe:b8:fa:a6:bf:bd:7e:02:0c
    Fingerprint (MD5):
        27:5C:31:BF:F6:2A:3E:B8:9A:F0:B4:60:43:70:42:0C
    Fingerprint (SHA1):
        2D:29:7B:B1:A4:8B:1A:BD:46:53:6A:CC:61:B3:F8:F3:24:6C:0F:C1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3261: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3262: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174331 (0x432f50bb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:19 2012
            Not After : Tue Nov 28 01:43:19 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:eb:9d:6c:34:d8:13:57:a7:99:d5:83:83:18:dd:bd:
                    e1:0b:72:a1:66:eb:10:c9:2d:a1:73:97:9f:de:c9:47:
                    e3:b9:d8:6a:48:4e:65:89:a9:f4:ad:a9:ba:1e:ef:e7:
                    a2:7f:fd:e6:43:80:e2:2b:b1:44:18:1f:cf:93:78:f2:
                    f4:a0:7b:1e:80:3d:5c:04:a8:a1:05:5f:77:9f:2f:b2:
                    1b:0b:b0:cf:25:4a:eb:b5:ea:c1:41:70:0f:d1:b9:19:
                    02:57:00:f4:95:43:95:2a:50:bb:85:91:64:89:90:48:
                    7d:2a:eb:88:1b:6a:7d:67:d1:e3:1e:a5:f2:b8:0e:87
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        56:6d:e0:e7:7b:aa:9f:9b:34:b9:e8:b3:a1:64:cb:91:
        dc:43:5f:02:95:e2:f3:bc:37:0b:5c:d8:07:5a:2c:82:
        4d:ea:bb:b2:25:25:66:0e:0d:58:2a:fc:73:db:3d:c6:
        2f:4c:79:ba:06:22:4e:3d:6d:d5:89:13:e0:9d:67:81:
        c9:6e:88:ac:85:d8:8c:7f:fe:1d:e1:21:7a:25:1e:72:
        ff:bc:a3:be:f4:53:2e:4f:72:5c:17:ee:3f:86:be:5f:
        38:ed:61:0d:43:e7:3d:4b:e3:1f:bf:fe:96:80:97:d0:
        15:02:09:95:a1:6a:b0:85:a2:2e:56:99:9c:a3:1e:c0
    Fingerprint (MD5):
        DE:FF:98:9E:58:86:8E:4E:EE:56:3F:36:B3:EE:78:0D
    Fingerprint (SHA1):
        5C:3F:0F:F0:6A:01:06:F4:EF:DA:22:1C:22:A6:F3:1F:95:DF:E9:5B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3263: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3264: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3265: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174333 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3266: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3267: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3268: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3269: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127174334   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3270: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3271: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3272: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3273: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127174335   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3274: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3275: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3276: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o User1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3277: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127174336   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3278: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3279: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3280: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o User2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3281: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127174337   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3282: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3283: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3284: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174333 (0x432f50bd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:22 2012
            Not After : Tue Nov 28 01:43:22 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:41:b7:29:3c:21:f3:d3:6d:91:6b:9f:c8:6b:0a:66:
                    41:6a:6e:fe:2a:eb:0a:10:e9:a6:97:d0:e5:20:d8:bd:
                    5f:d8:ee:29:8c:cd:8c:97:8a:a6:d6:32:8c:b7:9c:f2:
                    58:22:c4:bd:ed:d1:2d:c9:24:22:fe:52:d3:1e:87:5e:
                    6f:51:b8:a0:83:76:6f:f8:4b:21:28:e4:00:7a:dc:3e:
                    9a:cb:a2:72:43:e6:c6:16:89:cb:5e:d3:2e:c7:e8:38:
                    79:9e:3c:e7:d9:98:03:e5:cf:51:b6:20:41:db:f6:b2:
                    98:90:da:df:74:8c:a7:7a:f2:90:43:8f:bc:38:7c:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:d0:bb:f8:b7:d0:23:5b:35:1f:a2:9f:05:2a:a0:d7:
        72:aa:df:61:c9:a3:ad:2a:87:0e:2d:67:57:80:b5:9e:
        17:19:99:1b:b5:d5:9b:38:4b:02:20:54:34:97:af:c0:
        79:83:8d:bd:e7:96:5d:d5:71:9a:ba:cf:8c:5b:c8:16:
        ae:5d:0e:b6:d7:b4:58:74:f4:40:3e:96:c0:9e:0b:9f:
        fe:9f:9a:47:98:df:22:e6:4f:bd:51:f9:f3:bd:c8:1d:
        f1:c5:84:f4:70:fb:7e:ed:4e:70:93:d2:ff:8b:01:3b:
        86:34:29:39:0a:ac:99:90:53:30:8f:d2:db:04:33:bc
    Fingerprint (MD5):
        60:84:E6:FE:CC:8E:F3:CA:D3:74:71:57:0F:49:74:94
    Fingerprint (SHA1):
        6D:C8:91:E2:1A:1E:D4:45:89:E8:C0:B5:FB:96:AC:4D:28:EC:7B:EE


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3285: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3286: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174334 (0x432f50be)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:23 2012
            Not After : Tue Nov 28 01:43:23 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:16:78:d3:0f:05:fd:30:98:9c:98:77:de:f7:97:58:
                    b3:95:ad:d9:a7:40:d4:d5:b6:dc:b2:1e:f5:fe:9f:58:
                    96:3b:1c:6d:49:92:10:0c:cc:4e:77:e5:5f:c2:c1:09:
                    b2:5d:22:df:50:d0:fd:a2:6c:74:22:7c:8d:e6:e2:b6:
                    fe:43:54:db:cc:ca:81:24:d7:8b:a6:3e:99:8b:f9:d6:
                    ca:a9:e5:1d:65:bf:30:b3:e9:8c:d1:59:70:d9:68:56:
                    1b:6d:c5:82:32:62:33:28:9c:21:c7:a5:0a:83:f6:d7:
                    e0:6e:29:6b:d8:be:a7:20:6c:22:1b:a6:0d:27:7f:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:f9:86:c9:07:f1:be:86:84:dd:4d:c7:dd:3c:e3:df:
        ba:e9:57:6e:ee:fa:8b:4e:2d:12:e6:9c:49:7e:4d:fd:
        6c:49:38:b0:d2:52:af:79:6a:40:ac:c2:0d:a5:71:7c:
        59:56:09:18:23:e7:90:25:e6:d2:aa:da:08:86:4b:b5:
        45:b5:13:8d:17:e3:82:98:f4:4a:37:84:34:df:9f:5d:
        b4:69:26:bd:72:89:f2:6a:48:34:ad:9d:46:52:d2:7d:
        a2:4e:49:09:f8:31:dd:6c:9b:bb:ca:55:27:65:24:56:
        b1:6e:20:8e:b4:fa:e0:0a:c8:13:53:af:2c:36:59:df
    Fingerprint (MD5):
        40:10:9A:2C:D4:13:8A:D2:7C:31:8F:88:EB:24:74:89
    Fingerprint (SHA1):
        5C:1E:86:AB:CF:5D:AF:BF:97:D4:88:A2:2B:67:DE:95:9C:90:5C:EC


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3287: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3288: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174335 (0x432f50bf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:24 2012
            Not After : Tue Nov 28 01:43:24 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:db:bf:85:8f:d2:3a:aa:45:12:85:71:cf:e0:81:af:
                    d9:7a:f1:99:5b:7c:7d:17:62:f3:9e:86:d1:b2:0f:44:
                    93:fc:94:43:06:7a:7c:12:69:81:19:fd:74:05:55:ff:
                    77:63:3d:f5:da:16:cd:93:36:78:28:b8:09:fe:54:29:
                    5d:de:ae:26:2c:30:39:29:28:cb:fa:ca:0a:8a:66:a4:
                    f9:fe:7a:49:d3:91:bd:15:9a:4a:78:58:3b:d7:2b:1f:
                    62:8b:b9:d7:f5:f8:2f:60:5f:66:e8:83:cf:90:6c:21:
                    d4:a0:61:81:51:07:3c:07:26:e1:4a:f2:60:15:b5:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ce:c4:93:0c:eb:8a:d4:99:c9:c4:e0:6e:c4:66:27:29:
        a4:1d:68:a7:dc:29:c8:bd:b1:4a:60:e9:a9:f2:90:04:
        2b:c5:61:3f:80:56:97:29:0b:7a:5c:2e:2b:6c:7f:af:
        c3:1e:4c:f1:a3:04:be:1e:d6:dc:3b:b7:3a:17:00:be:
        a6:c6:33:d3:b3:59:2a:ab:21:32:6f:07:c8:83:36:5e:
        45:78:bd:f7:ce:24:88:01:89:96:25:21:86:29:94:75:
        9d:42:00:69:8d:db:b2:51:9f:bd:56:52:f7:a2:f4:84:
        46:63:ab:24:65:bf:ea:a3:9d:f9:54:fc:5f:66:a9:31
    Fingerprint (MD5):
        BA:D2:50:03:98:FE:11:6E:FF:D9:39:00:07:44:4A:32
    Fingerprint (SHA1):
        21:CD:EC:99:F0:A3:25:F1:4E:6E:57:05:08:B5:80:33:9E:ED:40:46


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3289: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3290: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3291: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3292: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3293: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174333 (0x432f50bd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:22 2012
            Not After : Tue Nov 28 01:43:22 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:41:b7:29:3c:21:f3:d3:6d:91:6b:9f:c8:6b:0a:66:
                    41:6a:6e:fe:2a:eb:0a:10:e9:a6:97:d0:e5:20:d8:bd:
                    5f:d8:ee:29:8c:cd:8c:97:8a:a6:d6:32:8c:b7:9c:f2:
                    58:22:c4:bd:ed:d1:2d:c9:24:22:fe:52:d3:1e:87:5e:
                    6f:51:b8:a0:83:76:6f:f8:4b:21:28:e4:00:7a:dc:3e:
                    9a:cb:a2:72:43:e6:c6:16:89:cb:5e:d3:2e:c7:e8:38:
                    79:9e:3c:e7:d9:98:03:e5:cf:51:b6:20:41:db:f6:b2:
                    98:90:da:df:74:8c:a7:7a:f2:90:43:8f:bc:38:7c:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:d0:bb:f8:b7:d0:23:5b:35:1f:a2:9f:05:2a:a0:d7:
        72:aa:df:61:c9:a3:ad:2a:87:0e:2d:67:57:80:b5:9e:
        17:19:99:1b:b5:d5:9b:38:4b:02:20:54:34:97:af:c0:
        79:83:8d:bd:e7:96:5d:d5:71:9a:ba:cf:8c:5b:c8:16:
        ae:5d:0e:b6:d7:b4:58:74:f4:40:3e:96:c0:9e:0b:9f:
        fe:9f:9a:47:98:df:22:e6:4f:bd:51:f9:f3:bd:c8:1d:
        f1:c5:84:f4:70:fb:7e:ed:4e:70:93:d2:ff:8b:01:3b:
        86:34:29:39:0a:ac:99:90:53:30:8f:d2:db:04:33:bc
    Fingerprint (MD5):
        60:84:E6:FE:CC:8E:F3:CA:D3:74:71:57:0F:49:74:94
    Fingerprint (SHA1):
        6D:C8:91:E2:1A:1E:D4:45:89:E8:C0:B5:FB:96:AC:4D:28:EC:7B:EE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3294: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3295: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174334 (0x432f50be)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:23 2012
            Not After : Tue Nov 28 01:43:23 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:16:78:d3:0f:05:fd:30:98:9c:98:77:de:f7:97:58:
                    b3:95:ad:d9:a7:40:d4:d5:b6:dc:b2:1e:f5:fe:9f:58:
                    96:3b:1c:6d:49:92:10:0c:cc:4e:77:e5:5f:c2:c1:09:
                    b2:5d:22:df:50:d0:fd:a2:6c:74:22:7c:8d:e6:e2:b6:
                    fe:43:54:db:cc:ca:81:24:d7:8b:a6:3e:99:8b:f9:d6:
                    ca:a9:e5:1d:65:bf:30:b3:e9:8c:d1:59:70:d9:68:56:
                    1b:6d:c5:82:32:62:33:28:9c:21:c7:a5:0a:83:f6:d7:
                    e0:6e:29:6b:d8:be:a7:20:6c:22:1b:a6:0d:27:7f:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:f9:86:c9:07:f1:be:86:84:dd:4d:c7:dd:3c:e3:df:
        ba:e9:57:6e:ee:fa:8b:4e:2d:12:e6:9c:49:7e:4d:fd:
        6c:49:38:b0:d2:52:af:79:6a:40:ac:c2:0d:a5:71:7c:
        59:56:09:18:23:e7:90:25:e6:d2:aa:da:08:86:4b:b5:
        45:b5:13:8d:17:e3:82:98:f4:4a:37:84:34:df:9f:5d:
        b4:69:26:bd:72:89:f2:6a:48:34:ad:9d:46:52:d2:7d:
        a2:4e:49:09:f8:31:dd:6c:9b:bb:ca:55:27:65:24:56:
        b1:6e:20:8e:b4:fa:e0:0a:c8:13:53:af:2c:36:59:df
    Fingerprint (MD5):
        40:10:9A:2C:D4:13:8A:D2:7C:31:8F:88:EB:24:74:89
    Fingerprint (SHA1):
        5C:1E:86:AB:CF:5D:AF:BF:97:D4:88:A2:2B:67:DE:95:9C:90:5C:EC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3296: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3297: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174335 (0x432f50bf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:24 2012
            Not After : Tue Nov 28 01:43:24 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:db:bf:85:8f:d2:3a:aa:45:12:85:71:cf:e0:81:af:
                    d9:7a:f1:99:5b:7c:7d:17:62:f3:9e:86:d1:b2:0f:44:
                    93:fc:94:43:06:7a:7c:12:69:81:19:fd:74:05:55:ff:
                    77:63:3d:f5:da:16:cd:93:36:78:28:b8:09:fe:54:29:
                    5d:de:ae:26:2c:30:39:29:28:cb:fa:ca:0a:8a:66:a4:
                    f9:fe:7a:49:d3:91:bd:15:9a:4a:78:58:3b:d7:2b:1f:
                    62:8b:b9:d7:f5:f8:2f:60:5f:66:e8:83:cf:90:6c:21:
                    d4:a0:61:81:51:07:3c:07:26:e1:4a:f2:60:15:b5:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ce:c4:93:0c:eb:8a:d4:99:c9:c4:e0:6e:c4:66:27:29:
        a4:1d:68:a7:dc:29:c8:bd:b1:4a:60:e9:a9:f2:90:04:
        2b:c5:61:3f:80:56:97:29:0b:7a:5c:2e:2b:6c:7f:af:
        c3:1e:4c:f1:a3:04:be:1e:d6:dc:3b:b7:3a:17:00:be:
        a6:c6:33:d3:b3:59:2a:ab:21:32:6f:07:c8:83:36:5e:
        45:78:bd:f7:ce:24:88:01:89:96:25:21:86:29:94:75:
        9d:42:00:69:8d:db:b2:51:9f:bd:56:52:f7:a2:f4:84:
        46:63:ab:24:65:bf:ea:a3:9d:f9:54:fc:5f:66:a9:31
    Fingerprint (MD5):
        BA:D2:50:03:98:FE:11:6E:FF:D9:39:00:07:44:4A:32
    Fingerprint (SHA1):
        21:CD:EC:99:F0:A3:25:F1:4E:6E:57:05:08:B5:80:33:9E:ED:40:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3298: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3299: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174333 (0x432f50bd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:22 2012
            Not After : Tue Nov 28 01:43:22 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:41:b7:29:3c:21:f3:d3:6d:91:6b:9f:c8:6b:0a:66:
                    41:6a:6e:fe:2a:eb:0a:10:e9:a6:97:d0:e5:20:d8:bd:
                    5f:d8:ee:29:8c:cd:8c:97:8a:a6:d6:32:8c:b7:9c:f2:
                    58:22:c4:bd:ed:d1:2d:c9:24:22:fe:52:d3:1e:87:5e:
                    6f:51:b8:a0:83:76:6f:f8:4b:21:28:e4:00:7a:dc:3e:
                    9a:cb:a2:72:43:e6:c6:16:89:cb:5e:d3:2e:c7:e8:38:
                    79:9e:3c:e7:d9:98:03:e5:cf:51:b6:20:41:db:f6:b2:
                    98:90:da:df:74:8c:a7:7a:f2:90:43:8f:bc:38:7c:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:d0:bb:f8:b7:d0:23:5b:35:1f:a2:9f:05:2a:a0:d7:
        72:aa:df:61:c9:a3:ad:2a:87:0e:2d:67:57:80:b5:9e:
        17:19:99:1b:b5:d5:9b:38:4b:02:20:54:34:97:af:c0:
        79:83:8d:bd:e7:96:5d:d5:71:9a:ba:cf:8c:5b:c8:16:
        ae:5d:0e:b6:d7:b4:58:74:f4:40:3e:96:c0:9e:0b:9f:
        fe:9f:9a:47:98:df:22:e6:4f:bd:51:f9:f3:bd:c8:1d:
        f1:c5:84:f4:70:fb:7e:ed:4e:70:93:d2:ff:8b:01:3b:
        86:34:29:39:0a:ac:99:90:53:30:8f:d2:db:04:33:bc
    Fingerprint (MD5):
        60:84:E6:FE:CC:8E:F3:CA:D3:74:71:57:0F:49:74:94
    Fingerprint (SHA1):
        6D:C8:91:E2:1A:1E:D4:45:89:E8:C0:B5:FB:96:AC:4D:28:EC:7B:EE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3300: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174333 (0x432f50bd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:22 2012
            Not After : Tue Nov 28 01:43:22 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:41:b7:29:3c:21:f3:d3:6d:91:6b:9f:c8:6b:0a:66:
                    41:6a:6e:fe:2a:eb:0a:10:e9:a6:97:d0:e5:20:d8:bd:
                    5f:d8:ee:29:8c:cd:8c:97:8a:a6:d6:32:8c:b7:9c:f2:
                    58:22:c4:bd:ed:d1:2d:c9:24:22:fe:52:d3:1e:87:5e:
                    6f:51:b8:a0:83:76:6f:f8:4b:21:28:e4:00:7a:dc:3e:
                    9a:cb:a2:72:43:e6:c6:16:89:cb:5e:d3:2e:c7:e8:38:
                    79:9e:3c:e7:d9:98:03:e5:cf:51:b6:20:41:db:f6:b2:
                    98:90:da:df:74:8c:a7:7a:f2:90:43:8f:bc:38:7c:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:d0:bb:f8:b7:d0:23:5b:35:1f:a2:9f:05:2a:a0:d7:
        72:aa:df:61:c9:a3:ad:2a:87:0e:2d:67:57:80:b5:9e:
        17:19:99:1b:b5:d5:9b:38:4b:02:20:54:34:97:af:c0:
        79:83:8d:bd:e7:96:5d:d5:71:9a:ba:cf:8c:5b:c8:16:
        ae:5d:0e:b6:d7:b4:58:74:f4:40:3e:96:c0:9e:0b:9f:
        fe:9f:9a:47:98:df:22:e6:4f:bd:51:f9:f3:bd:c8:1d:
        f1:c5:84:f4:70:fb:7e:ed:4e:70:93:d2:ff:8b:01:3b:
        86:34:29:39:0a:ac:99:90:53:30:8f:d2:db:04:33:bc
    Fingerprint (MD5):
        60:84:E6:FE:CC:8E:F3:CA:D3:74:71:57:0F:49:74:94
    Fingerprint (SHA1):
        6D:C8:91:E2:1A:1E:D4:45:89:E8:C0:B5:FB:96:AC:4D:28:EC:7B:EE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3301: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174334 (0x432f50be)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:23 2012
            Not After : Tue Nov 28 01:43:23 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:16:78:d3:0f:05:fd:30:98:9c:98:77:de:f7:97:58:
                    b3:95:ad:d9:a7:40:d4:d5:b6:dc:b2:1e:f5:fe:9f:58:
                    96:3b:1c:6d:49:92:10:0c:cc:4e:77:e5:5f:c2:c1:09:
                    b2:5d:22:df:50:d0:fd:a2:6c:74:22:7c:8d:e6:e2:b6:
                    fe:43:54:db:cc:ca:81:24:d7:8b:a6:3e:99:8b:f9:d6:
                    ca:a9:e5:1d:65:bf:30:b3:e9:8c:d1:59:70:d9:68:56:
                    1b:6d:c5:82:32:62:33:28:9c:21:c7:a5:0a:83:f6:d7:
                    e0:6e:29:6b:d8:be:a7:20:6c:22:1b:a6:0d:27:7f:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:f9:86:c9:07:f1:be:86:84:dd:4d:c7:dd:3c:e3:df:
        ba:e9:57:6e:ee:fa:8b:4e:2d:12:e6:9c:49:7e:4d:fd:
        6c:49:38:b0:d2:52:af:79:6a:40:ac:c2:0d:a5:71:7c:
        59:56:09:18:23:e7:90:25:e6:d2:aa:da:08:86:4b:b5:
        45:b5:13:8d:17:e3:82:98:f4:4a:37:84:34:df:9f:5d:
        b4:69:26:bd:72:89:f2:6a:48:34:ad:9d:46:52:d2:7d:
        a2:4e:49:09:f8:31:dd:6c:9b:bb:ca:55:27:65:24:56:
        b1:6e:20:8e:b4:fa:e0:0a:c8:13:53:af:2c:36:59:df
    Fingerprint (MD5):
        40:10:9A:2C:D4:13:8A:D2:7C:31:8F:88:EB:24:74:89
    Fingerprint (SHA1):
        5C:1E:86:AB:CF:5D:AF:BF:97:D4:88:A2:2B:67:DE:95:9C:90:5C:EC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3302: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174334 (0x432f50be)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:23 2012
            Not After : Tue Nov 28 01:43:23 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:16:78:d3:0f:05:fd:30:98:9c:98:77:de:f7:97:58:
                    b3:95:ad:d9:a7:40:d4:d5:b6:dc:b2:1e:f5:fe:9f:58:
                    96:3b:1c:6d:49:92:10:0c:cc:4e:77:e5:5f:c2:c1:09:
                    b2:5d:22:df:50:d0:fd:a2:6c:74:22:7c:8d:e6:e2:b6:
                    fe:43:54:db:cc:ca:81:24:d7:8b:a6:3e:99:8b:f9:d6:
                    ca:a9:e5:1d:65:bf:30:b3:e9:8c:d1:59:70:d9:68:56:
                    1b:6d:c5:82:32:62:33:28:9c:21:c7:a5:0a:83:f6:d7:
                    e0:6e:29:6b:d8:be:a7:20:6c:22:1b:a6:0d:27:7f:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:f9:86:c9:07:f1:be:86:84:dd:4d:c7:dd:3c:e3:df:
        ba:e9:57:6e:ee:fa:8b:4e:2d:12:e6:9c:49:7e:4d:fd:
        6c:49:38:b0:d2:52:af:79:6a:40:ac:c2:0d:a5:71:7c:
        59:56:09:18:23:e7:90:25:e6:d2:aa:da:08:86:4b:b5:
        45:b5:13:8d:17:e3:82:98:f4:4a:37:84:34:df:9f:5d:
        b4:69:26:bd:72:89:f2:6a:48:34:ad:9d:46:52:d2:7d:
        a2:4e:49:09:f8:31:dd:6c:9b:bb:ca:55:27:65:24:56:
        b1:6e:20:8e:b4:fa:e0:0a:c8:13:53:af:2c:36:59:df
    Fingerprint (MD5):
        40:10:9A:2C:D4:13:8A:D2:7C:31:8F:88:EB:24:74:89
    Fingerprint (SHA1):
        5C:1E:86:AB:CF:5D:AF:BF:97:D4:88:A2:2B:67:DE:95:9C:90:5C:EC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3303: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174335 (0x432f50bf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:24 2012
            Not After : Tue Nov 28 01:43:24 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:db:bf:85:8f:d2:3a:aa:45:12:85:71:cf:e0:81:af:
                    d9:7a:f1:99:5b:7c:7d:17:62:f3:9e:86:d1:b2:0f:44:
                    93:fc:94:43:06:7a:7c:12:69:81:19:fd:74:05:55:ff:
                    77:63:3d:f5:da:16:cd:93:36:78:28:b8:09:fe:54:29:
                    5d:de:ae:26:2c:30:39:29:28:cb:fa:ca:0a:8a:66:a4:
                    f9:fe:7a:49:d3:91:bd:15:9a:4a:78:58:3b:d7:2b:1f:
                    62:8b:b9:d7:f5:f8:2f:60:5f:66:e8:83:cf:90:6c:21:
                    d4:a0:61:81:51:07:3c:07:26:e1:4a:f2:60:15:b5:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ce:c4:93:0c:eb:8a:d4:99:c9:c4:e0:6e:c4:66:27:29:
        a4:1d:68:a7:dc:29:c8:bd:b1:4a:60:e9:a9:f2:90:04:
        2b:c5:61:3f:80:56:97:29:0b:7a:5c:2e:2b:6c:7f:af:
        c3:1e:4c:f1:a3:04:be:1e:d6:dc:3b:b7:3a:17:00:be:
        a6:c6:33:d3:b3:59:2a:ab:21:32:6f:07:c8:83:36:5e:
        45:78:bd:f7:ce:24:88:01:89:96:25:21:86:29:94:75:
        9d:42:00:69:8d:db:b2:51:9f:bd:56:52:f7:a2:f4:84:
        46:63:ab:24:65:bf:ea:a3:9d:f9:54:fc:5f:66:a9:31
    Fingerprint (MD5):
        BA:D2:50:03:98:FE:11:6E:FF:D9:39:00:07:44:4A:32
    Fingerprint (SHA1):
        21:CD:EC:99:F0:A3:25:F1:4E:6E:57:05:08:B5:80:33:9E:ED:40:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3304: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174335 (0x432f50bf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:24 2012
            Not After : Tue Nov 28 01:43:24 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:db:bf:85:8f:d2:3a:aa:45:12:85:71:cf:e0:81:af:
                    d9:7a:f1:99:5b:7c:7d:17:62:f3:9e:86:d1:b2:0f:44:
                    93:fc:94:43:06:7a:7c:12:69:81:19:fd:74:05:55:ff:
                    77:63:3d:f5:da:16:cd:93:36:78:28:b8:09:fe:54:29:
                    5d:de:ae:26:2c:30:39:29:28:cb:fa:ca:0a:8a:66:a4:
                    f9:fe:7a:49:d3:91:bd:15:9a:4a:78:58:3b:d7:2b:1f:
                    62:8b:b9:d7:f5:f8:2f:60:5f:66:e8:83:cf:90:6c:21:
                    d4:a0:61:81:51:07:3c:07:26:e1:4a:f2:60:15:b5:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ce:c4:93:0c:eb:8a:d4:99:c9:c4:e0:6e:c4:66:27:29:
        a4:1d:68:a7:dc:29:c8:bd:b1:4a:60:e9:a9:f2:90:04:
        2b:c5:61:3f:80:56:97:29:0b:7a:5c:2e:2b:6c:7f:af:
        c3:1e:4c:f1:a3:04:be:1e:d6:dc:3b:b7:3a:17:00:be:
        a6:c6:33:d3:b3:59:2a:ab:21:32:6f:07:c8:83:36:5e:
        45:78:bd:f7:ce:24:88:01:89:96:25:21:86:29:94:75:
        9d:42:00:69:8d:db:b2:51:9f:bd:56:52:f7:a2:f4:84:
        46:63:ab:24:65:bf:ea:a3:9d:f9:54:fc:5f:66:a9:31
    Fingerprint (MD5):
        BA:D2:50:03:98:FE:11:6E:FF:D9:39:00:07:44:4A:32
    Fingerprint (SHA1):
        21:CD:EC:99:F0:A3:25:F1:4E:6E:57:05:08:B5:80:33:9E:ED:40:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3305: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3306: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174338 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3307: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3308: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3309: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3310: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127174339   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3311: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3312: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3313: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3314: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127174340   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3315: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3316: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3317: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3318: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127174341   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3319: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #3320: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3321: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o User1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3322: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127174342   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3323: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3324: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3325: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o User2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3326: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127174343   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3327: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3328: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #3329: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o User3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3330: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127174344   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3331: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #3332: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3333: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #3334: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #3335: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3336: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #3337: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174338 (0x432f50c2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:28 2012
            Not After : Tue Nov 28 01:43:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:5b:71:f3:d0:04:d8:d9:81:b2:96:d2:72:c8:8d:45:
                    9b:11:5f:27:bf:1d:b4:ce:f3:25:9d:c4:64:35:eb:23:
                    44:ea:6e:13:25:ae:d9:55:07:d5:c3:6a:95:cf:03:76:
                    f1:c7:cf:70:6b:0b:b8:ed:b2:b7:34:4b:da:38:b6:aa:
                    ad:56:81:b1:a6:34:02:2f:e7:a3:65:b3:7f:55:15:62:
                    c2:49:17:1c:9b:97:43:a0:81:53:99:24:e1:bc:e5:c6:
                    95:7a:79:87:86:cf:a0:bc:05:d2:a1:03:dc:7e:d0:48:
                    ff:24:95:90:e2:99:63:5c:ae:b7:0e:11:f0:36:d8:5d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:17:0f:cd:85:51:60:a6:db:0a:bc:bb:3e:e3:0a:5a:
        e3:aa:bc:08:a6:5c:5c:81:4c:a6:d4:46:89:19:e5:c9:
        13:94:32:4e:b9:e7:1b:2d:bb:b1:b7:85:0c:26:4f:38:
        ea:45:3b:32:fa:2e:f9:4f:cd:da:31:ac:3e:3c:83:0a:
        b2:dd:32:0c:99:f8:45:ce:78:a9:7c:00:dd:c6:f0:94:
        97:73:d1:01:3e:31:96:33:12:09:38:b6:7f:15:68:2e:
        96:8e:5e:b9:86:b3:3f:5b:1e:f9:59:96:68:05:73:9e:
        4f:c6:12:bf:af:55:86:28:a9:02:42:02:9b:a7:b2:22
    Fingerprint (MD5):
        2F:CE:85:75:9C:C7:F5:EF:23:E0:2C:37:46:3E:BB:38
    Fingerprint (SHA1):
        A4:1E:87:CC:F1:24:35:3A:A1:A6:47:51:8F:F4:EB:DF:21:D7:AB:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3338: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3339: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3340: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3341: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174338 (0x432f50c2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:28 2012
            Not After : Tue Nov 28 01:43:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:5b:71:f3:d0:04:d8:d9:81:b2:96:d2:72:c8:8d:45:
                    9b:11:5f:27:bf:1d:b4:ce:f3:25:9d:c4:64:35:eb:23:
                    44:ea:6e:13:25:ae:d9:55:07:d5:c3:6a:95:cf:03:76:
                    f1:c7:cf:70:6b:0b:b8:ed:b2:b7:34:4b:da:38:b6:aa:
                    ad:56:81:b1:a6:34:02:2f:e7:a3:65:b3:7f:55:15:62:
                    c2:49:17:1c:9b:97:43:a0:81:53:99:24:e1:bc:e5:c6:
                    95:7a:79:87:86:cf:a0:bc:05:d2:a1:03:dc:7e:d0:48:
                    ff:24:95:90:e2:99:63:5c:ae:b7:0e:11:f0:36:d8:5d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:17:0f:cd:85:51:60:a6:db:0a:bc:bb:3e:e3:0a:5a:
        e3:aa:bc:08:a6:5c:5c:81:4c:a6:d4:46:89:19:e5:c9:
        13:94:32:4e:b9:e7:1b:2d:bb:b1:b7:85:0c:26:4f:38:
        ea:45:3b:32:fa:2e:f9:4f:cd:da:31:ac:3e:3c:83:0a:
        b2:dd:32:0c:99:f8:45:ce:78:a9:7c:00:dd:c6:f0:94:
        97:73:d1:01:3e:31:96:33:12:09:38:b6:7f:15:68:2e:
        96:8e:5e:b9:86:b3:3f:5b:1e:f9:59:96:68:05:73:9e:
        4f:c6:12:bf:af:55:86:28:a9:02:42:02:9b:a7:b2:22
    Fingerprint (MD5):
        2F:CE:85:75:9C:C7:F5:EF:23:E0:2C:37:46:3E:BB:38
    Fingerprint (SHA1):
        A4:1E:87:CC:F1:24:35:3A:A1:A6:47:51:8F:F4:EB:DF:21:D7:AB:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3342: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3343: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3344: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174345 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3345: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3346: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3347: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3348: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127174346   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3349: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3350: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #3351: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3352: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127174347   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3353: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #3354: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #3355: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA13Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3356: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127174348   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3357: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #3358: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3359: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3360: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127174349   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3361: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #3362: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #3363: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA22Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3364: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127174350   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3365: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #3366: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #3367: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA23Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3368: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127174351   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3369: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #3370: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3371: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3372: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127174352   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3373: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #3374: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #3375: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA32Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3376: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127174353   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3377: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #3378: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #3379: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA33Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3380: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127174354   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3381: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #3382: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3383: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3384: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127174355   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3385: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #3386: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #3387: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA42Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3388: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127174356   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3389: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #3390: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #3391: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA43Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3392: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127174357   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3393: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #3394: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3395: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3396: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127174358   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3397: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #3398: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #3399: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA52Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3400: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127174359   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3401: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #3402: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #3403: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA53Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3404: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127174360   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3405: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #3406: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #3407: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE5Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3408: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127174361   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3409: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #3410: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #3411: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA61Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3412: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127174362   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3413: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #3414: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #3415: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA62Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3416: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127174363   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3417: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #3418: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #3419: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE62Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3420: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127174364   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3421: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #3422: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #3423: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA63Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3424: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127174365   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3425: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #3426: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #3427: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE63Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3428: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127174366   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3429: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #3430: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #3431: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA64Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3432: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127174367   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3433: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #3434: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #3435: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE64Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3436: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127174368   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3437: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #3438: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #3439: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA65Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3440: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127174369   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3441: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #3442: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #3443: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE65Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3444: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127174370   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3445: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #3446: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #3447: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA66Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3448: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127174371   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3449: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #3450: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #3451: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE66Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3452: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127174372   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3453: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #3454: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #3455: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA67Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3456: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127174373   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3457: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #3458: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #3459: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE67Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3460: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127174374   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3461: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #3462: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3463: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3464: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3465: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3466: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3467: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3468: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3469: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3470: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3471: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3472: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3473: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3474: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3475: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3476: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3477: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3478: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3479: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3480: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3481: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3482: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3483: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3484: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3485: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174345 (0x432f50c9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:34 2012
            Not After : Tue Nov 28 01:43:34 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:00:65:ff:71:7c:95:53:94:2b:88:e1:e1:6c:c0:40:
                    82:4c:42:94:23:e5:31:c8:34:36:93:a5:d7:b4:4f:78:
                    86:23:07:4e:a4:e8:64:ef:61:48:bb:ad:d6:85:34:44:
                    7a:81:31:9f:93:ee:29:b0:91:f6:ef:69:f0:19:69:cc:
                    1e:dc:0b:67:2e:db:93:97:30:e3:d4:35:f8:5a:6a:b3:
                    14:72:80:e3:8c:47:7b:c5:08:6e:84:29:2d:f9:73:ec:
                    dc:1f:e9:ff:45:d1:f7:64:39:85:00:13:d8:40:3a:6a:
                    dd:15:10:cd:cb:f9:cd:15:2c:01:83:9b:57:29:34:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5c:c7:a7:61:41:2d:99:bc:d6:db:3d:d1:d4:18:40:d0:
        f8:06:37:3c:78:68:24:c4:08:cb:74:ff:71:f6:3d:0f:
        12:6b:e0:c6:c5:b6:cb:84:b8:5c:91:ad:a4:6a:8c:a9:
        05:66:d0:14:08:57:54:11:64:04:2d:36:22:74:5c:11:
        fc:da:c3:26:36:a9:2c:14:f4:88:97:24:e2:81:c4:5a:
        ab:8e:01:15:8d:6c:50:aa:38:db:7e:9b:fa:4e:ea:cc:
        a5:bd:76:13:ad:42:ea:45:a6:1f:a5:e9:7a:64:05:32:
        1d:ae:db:d1:a7:8d:1c:3c:9a:a0:af:1d:7f:77:a4:3c
    Fingerprint (MD5):
        67:DA:6E:8E:A3:93:32:5D:8D:80:42:47:1C:C8:91:7A
    Fingerprint (SHA1):
        5E:B4:0C:E2:90:5F:E3:81:54:86:AF:61:94:BD:0D:08:42:B7:16:14


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3486: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3487: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3488: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174375 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3489: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3490: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #3491: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o nonEVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3492: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127174376   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3493: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #3494: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #3495: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3496: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127174377   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3497: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #3498: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #3499: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o otherEVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3500: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127174378   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3501: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #3502: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #3503: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o validEVReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3504: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127174379   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3505: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #3506: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #3507: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o invalidEVReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3508: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127174380   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3509: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #3510: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #3511: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o wrongEVOIDReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3512: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127174381   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3513: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #3514: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3515: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174375 (0x432f50e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:58 2012
            Not After : Tue Nov 28 01:43:58 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:48:09:8e:4a:d6:49:85:41:81:35:c0:71:aa:b5:5a:
                    a7:37:19:14:84:0c:1f:d0:ce:c9:b3:33:48:78:c1:31:
                    a8:18:72:8a:10:fa:52:a6:eb:62:ec:35:1f:19:b3:aa:
                    f1:22:c5:05:64:6f:b9:b5:c7:6f:60:7a:3c:55:ea:d3:
                    9e:80:dc:0d:87:88:0a:58:3d:ba:c7:92:05:19:22:cf:
                    fd:27:66:2b:ef:ff:b9:d3:a5:d1:fa:56:0e:e6:4c:f4:
                    0d:68:3f:19:5e:38:24:e7:a6:32:31:3b:2a:df:c4:d9:
                    7c:73:d0:50:9d:07:d3:53:91:69:36:b2:0e:dd:49:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        94:d7:ec:50:56:8e:c8:b3:ba:12:03:c3:a9:cc:43:41:
        b6:ca:30:0e:fd:e2:e8:b2:ec:8f:2c:f8:74:c6:b9:f9:
        ee:1b:d2:52:c8:79:8a:d3:cd:19:2b:6b:4f:cd:f1:72:
        83:bb:46:fc:d4:c3:6f:fd:d3:7f:cc:f8:09:d5:03:6c:
        d9:15:3e:57:bc:9d:d0:4d:55:a1:be:7d:c0:e4:b8:88:
        6c:cb:7b:4a:4e:ee:a1:eb:fa:b9:0b:4b:64:3e:fe:95:
        65:25:f4:86:7a:0f:da:1f:76:42:cd:a6:81:48:56:00:
        1c:68:ef:10:70:04:8a:3e:ca:55:bb:be:d6:01:d5:66
    Fingerprint (MD5):
        D8:B3:B7:81:53:4D:98:0C:FE:BD:92:4D:35:D2:39:3B
    Fingerprint (SHA1):
        4C:38:E5:8C:CF:40:AC:B0:4F:69:93:5A:61:DD:58:D9:EA:DF:87:98


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3516: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3517: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3518: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3519: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174375 (0x432f50e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:43:58 2012
            Not After : Tue Nov 28 01:43:58 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:48:09:8e:4a:d6:49:85:41:81:35:c0:71:aa:b5:5a:
                    a7:37:19:14:84:0c:1f:d0:ce:c9:b3:33:48:78:c1:31:
                    a8:18:72:8a:10:fa:52:a6:eb:62:ec:35:1f:19:b3:aa:
                    f1:22:c5:05:64:6f:b9:b5:c7:6f:60:7a:3c:55:ea:d3:
                    9e:80:dc:0d:87:88:0a:58:3d:ba:c7:92:05:19:22:cf:
                    fd:27:66:2b:ef:ff:b9:d3:a5:d1:fa:56:0e:e6:4c:f4:
                    0d:68:3f:19:5e:38:24:e7:a6:32:31:3b:2a:df:c4:d9:
                    7c:73:d0:50:9d:07:d3:53:91:69:36:b2:0e:dd:49:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        94:d7:ec:50:56:8e:c8:b3:ba:12:03:c3:a9:cc:43:41:
        b6:ca:30:0e:fd:e2:e8:b2:ec:8f:2c:f8:74:c6:b9:f9:
        ee:1b:d2:52:c8:79:8a:d3:cd:19:2b:6b:4f:cd:f1:72:
        83:bb:46:fc:d4:c3:6f:fd:d3:7f:cc:f8:09:d5:03:6c:
        d9:15:3e:57:bc:9d:d0:4d:55:a1:be:7d:c0:e4:b8:88:
        6c:cb:7b:4a:4e:ee:a1:eb:fa:b9:0b:4b:64:3e:fe:95:
        65:25:f4:86:7a:0f:da:1f:76:42:cd:a6:81:48:56:00:
        1c:68:ef:10:70:04:8a:3e:ca:55:bb:be:d6:01:d5:66
    Fingerprint (MD5):
        D8:B3:B7:81:53:4D:98:0C:FE:BD:92:4D:35:D2:39:3B
    Fingerprint (SHA1):
        4C:38:E5:8C:CF:40:AC:B0:4F:69:93:5A:61:DD:58:D9:EA:DF:87:98

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3520: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3521: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3522: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3523: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174382 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3524: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3525: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3526: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3527: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127174383   --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3528: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3529: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3530: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3531: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127174384   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3532: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3533: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3534: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3535: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127174385   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3536: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3537: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3538: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3539: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3540: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3541: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174382 (0x432f50ee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:04 2012
            Not After : Tue Nov 28 01:44:04 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:b1:a2:90:ae:45:fc:68:98:d1:85:c3:b7:94:79:73:
                    64:23:65:a8:28:cb:8f:b4:51:29:4a:f7:d8:dd:4c:d9:
                    1a:80:98:64:3c:46:f4:c0:4f:99:9b:bb:1c:f4:79:8f:
                    63:cc:cd:33:43:ae:89:ab:97:7c:45:b7:90:e9:62:e0:
                    2c:bf:3d:c2:72:f7:2e:b2:bb:82:c9:c5:b6:09:a6:c3:
                    6a:c7:5a:85:30:31:b0:71:b1:5a:ce:bb:0a:0d:2f:3f:
                    18:81:34:34:e7:96:8f:b5:ab:a3:37:ab:3a:cf:7b:1b:
                    47:b8:8e:8e:ed:14:49:99:16:b6:27:0a:1c:e4:22:95
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:bb:cb:ef:58:e6:7b:0a:62:21:45:57:09:c0:f2:ab:
        08:fc:56:c3:ff:14:cc:4e:69:bc:dc:e2:c6:4e:d8:67:
        3f:12:a6:31:8e:1a:55:4e:f1:21:1c:4a:4d:e7:99:f1:
        16:39:0b:25:b7:e2:8c:a8:8b:af:8e:38:6e:40:2e:34:
        32:06:1a:fb:7b:f7:c6:e2:26:24:80:78:89:d4:24:5e:
        01:91:79:51:11:c8:1d:4e:95:10:b1:d1:a8:ed:4d:a8:
        b0:8f:9f:29:8c:c6:ee:4a:ba:3f:c8:67:b6:e7:41:8d:
        1b:7f:99:3e:69:e8:30:b2:ce:12:41:31:68:a4:6b:ce
    Fingerprint (MD5):
        55:B9:2E:83:B0:11:2A:1E:4C:D2:AF:AE:15:B7:E6:5E
    Fingerprint (SHA1):
        D1:50:73:61:7F:4A:92:E4:C4:8C:3B:A3:65:CD:A0:E8:C2:E8:AF:7E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3542: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3543: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3544: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174383 (0x432f50ef)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:05 2012
            Not After : Tue Nov 28 01:44:05 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:69:37:11:78:1b:55:f8:64:40:b6:07:5d:9c:da:ba:
                    15:3d:2b:7e:0c:79:c6:84:5e:70:44:9b:cc:c5:8a:e5:
                    63:24:bc:3e:67:b9:a3:63:83:9d:08:b3:de:81:74:80:
                    f0:d0:47:cc:4b:6b:3c:22:1a:d0:bd:ff:60:48:72:a8:
                    4f:43:23:03:a2:49:1f:9f:95:f4:28:8a:64:08:45:67:
                    3d:a7:76:e7:d1:db:bc:32:91:f5:d9:44:5a:9d:7d:53:
                    9e:54:4a:bf:03:35:d5:3a:e3:05:e2:5f:63:53:d1:82:
                    55:ea:61:14:6f:67:d3:c1:e4:15:52:31:26:ce:4e:f3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        63:10:d4:ef:ba:90:96:fe:b1:c8:6e:81:cf:b5:6d:65:
        78:7d:27:32:b1:c7:d4:0c:09:b9:7a:98:34:e4:1d:26:
        98:a1:17:23:da:90:a4:fb:fe:c5:84:d2:c3:51:b0:5a:
        36:2f:2a:ce:bb:8d:08:cf:32:dc:80:91:63:27:96:e6:
        2f:e3:07:d8:3f:9c:d5:12:8c:2b:ff:d1:81:3e:33:ee:
        f3:08:60:bf:38:7b:86:ec:fc:f4:02:07:25:08:3a:f9:
        5f:40:5d:b3:1d:97:bb:f6:22:24:b5:38:d1:15:16:98:
        d0:18:77:73:f2:4e:d3:af:53:3c:24:ba:84:31:eb:33
    Fingerprint (MD5):
        F9:4D:03:EA:13:0A:D0:EF:76:A3:61:79:13:68:29:69
    Fingerprint (SHA1):
        94:E5:D3:58:58:53:D2:8A:69:09:D0:3E:B1:7D:D2:9D:35:C7:8F:7F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3545: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3546: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174384 (0x432f50f0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:05 2012
            Not After : Tue Nov 28 01:44:05 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:e0:00:89:3e:3f:5b:d9:44:3f:b2:f9:0a:af:50:2a:
                    a8:3a:56:45:d0:b7:57:c6:5f:9d:98:6d:06:a1:0e:a6:
                    b5:e9:9c:8d:03:13:b6:b7:7b:91:53:9e:0b:f3:0c:a8:
                    56:6d:68:00:6d:72:0b:f9:78:73:b3:24:80:36:c9:d0:
                    d8:37:da:c7:0d:1d:85:1e:a3:d9:c1:6d:e2:88:53:6d:
                    ce:fd:5f:4a:02:de:c8:19:c7:45:50:09:37:ed:ce:67:
                    eb:d2:cc:4a:bd:10:d6:a7:f7:6f:5e:f1:aa:2e:c1:8b:
                    e0:c1:51:6b:f2:83:13:90:46:c7:3e:9f:21:17:8e:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:f5:5a:0b:12:47:12:04:63:78:76:50:07:cf:85:1a:
        25:5e:bf:a1:94:f6:d3:be:d3:31:a9:ef:ae:dc:e4:ba:
        1e:32:70:f3:6b:73:71:64:01:c1:2c:58:dc:a0:33:ab:
        2c:57:86:fc:70:3e:7f:57:96:5d:5f:74:b6:af:5f:c6:
        fb:2f:e4:ff:72:af:3f:a4:0b:3e:01:e1:fa:ce:6e:56:
        58:b3:56:7f:c7:98:cc:bb:b5:3c:50:a1:08:5c:db:33:
        1b:45:02:0d:82:fe:b7:ff:92:b8:b3:7b:77:cc:d8:d3:
        fc:7d:b9:5c:4f:39:34:67:6c:c0:c7:9f:34:f1:48:3f
    Fingerprint (MD5):
        31:FB:9F:20:FB:C6:0E:19:8B:EE:C8:94:FF:18:CD:25
    Fingerprint (SHA1):
        E5:0E:1F:96:33:22:A1:77:AD:5B:E9:65:62:07:01:42:D1:C2:6E:F8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3547: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3548: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174386 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3549: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3550: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3551: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3552: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127174387   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3553: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3554: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3555: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3556: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127174388   --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3557: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3558: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3559: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3560: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127174389   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3561: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #3562: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3563: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3564: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127174390   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3565: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #3566: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3567: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3568: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3569: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3570: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #3571: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174386 (0x432f50f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:08 2012
            Not After : Tue Nov 28 01:44:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e0:b5:8c:9b:ff:28:56:56:94:c7:cb:84:95:18:ff:50:
                    89:45:c4:1a:17:d9:53:b5:50:06:1d:25:da:28:2f:6a:
                    d0:71:91:e9:bf:6a:cb:79:ee:f9:72:f9:62:66:dc:e8:
                    1e:6e:41:4d:b6:3e:63:a4:d2:08:68:20:0c:d5:40:98:
                    62:21:a6:66:ae:65:17:b4:2a:9c:67:66:d1:dc:e2:51:
                    fa:11:69:98:ae:f2:60:36:aa:24:bb:8b:3d:83:36:e0:
                    50:c4:9a:34:bd:ef:35:c1:12:4e:ec:51:d4:29:73:8e:
                    44:cc:3d:2c:b5:b9:6f:ae:d2:a7:2b:30:fd:e0:fd:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        da:fa:aa:da:b4:e7:3c:d4:ab:cc:5d:5a:99:c4:f0:6e:
        4c:ff:94:cc:9f:54:f7:28:3e:43:ba:dd:2c:cc:05:f0:
        cc:23:8a:2b:df:77:1f:b0:00:43:28:3c:ae:19:f9:76:
        1b:25:20:3c:68:46:0e:3c:52:66:ed:57:a2:90:20:d1:
        95:8f:ce:8a:71:6c:81:0d:cb:62:77:9f:3c:10:68:6e:
        83:e8:03:b1:e2:6e:e6:fc:f6:92:f6:b5:62:b0:01:4d:
        e8:9d:fb:c4:06:7b:0e:08:56:9a:44:21:c0:1e:d8:f7:
        80:c4:87:43:f1:c2:17:d0:0f:85:7b:96:6c:a5:31:ff
    Fingerprint (MD5):
        E9:09:AC:9E:20:1C:88:0E:95:31:D5:21:F9:F4:B6:81
    Fingerprint (SHA1):
        D9:16:29:E9:EC:08:05:4E:0C:B5:3A:C0:02:79:7D:0E:1A:F4:4E:09

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3572: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3573: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174387 (0x432f50f3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:09 2012
            Not After : Tue Nov 28 01:44:09 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:8f:93:2c:46:82:85:c9:32:25:21:f2:5b:d5:8c:d0:
                    44:7f:f9:8b:d0:0c:af:86:52:83:21:84:29:9d:70:5a:
                    7d:04:2d:95:a6:f1:e5:98:0c:8e:c5:c5:2c:9d:78:cd:
                    0b:2a:32:78:95:59:12:a9:c0:8c:6c:b2:f9:5e:98:16:
                    20:67:38:e7:4f:e4:0b:7c:44:f5:16:2e:31:ec:c6:0d:
                    0c:af:3a:2e:77:c7:85:f8:72:4f:09:6e:7c:ba:83:6c:
                    a4:b2:a4:95:82:2e:e3:7b:16:a1:5b:71:fa:58:d0:74:
                    92:a7:92:ec:7d:80:6c:7d:01:2f:81:b2:af:9a:64:d1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:49:bd:cd:75:8d:11:87:63:f2:4a:5e:aa:39:d7:34:
        a9:43:d1:56:84:8d:18:a2:bc:65:66:dc:9c:90:6e:f5:
        fb:0a:1f:a1:52:fc:7e:c1:85:e3:d5:1a:55:db:17:72:
        26:db:82:9d:46:8c:45:8f:8d:76:1c:e5:af:ff:73:77:
        a7:cf:77:09:64:cd:78:48:f5:7f:9a:66:25:ff:72:a1:
        00:c4:5f:c3:2d:29:7c:d3:9e:ee:6c:fd:48:27:00:95:
        55:74:01:ee:0c:cc:7b:24:49:70:86:90:9a:9f:aa:f9:
        4a:53:db:51:09:dc:1e:55:61:a7:1e:9f:ae:7b:e8:ca
    Fingerprint (MD5):
        4C:97:44:21:76:1C:48:2F:63:6E:38:55:8D:79:9B:C0
    Fingerprint (SHA1):
        17:95:16:4D:42:31:93:24:4F:7C:75:84:C3:8E:C8:FF:F9:C8:23:3C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3574: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3575: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3576: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174388 (0x432f50f4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:09 2012
            Not After : Tue Nov 28 01:44:09 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:85:53:d8:f4:63:f1:99:39:1c:14:d3:31:c2:45:38:
                    76:a7:e4:85:d5:45:5e:43:10:1e:3f:e7:2f:78:6d:a3:
                    52:58:29:2c:f1:e6:47:48:d9:ba:6d:8b:0f:a9:cd:07:
                    ae:3e:ac:3d:57:fb:4d:40:8a:23:a2:ff:33:bf:57:e6:
                    f0:db:61:9b:1d:7b:5a:a4:9e:49:09:39:11:5d:96:6e:
                    94:da:62:b2:b4:a4:f9:42:62:49:c4:6f:4b:02:66:1e:
                    5d:92:82:14:0f:d9:92:96:5a:08:db:bf:ec:ac:e2:64:
                    85:5d:28:61:a7:8c:e5:66:d5:57:4a:fb:6d:c5:bf:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        55:5f:03:87:54:10:bd:07:12:32:31:4e:51:c6:ea:68:
        e2:bb:54:ba:a9:0d:e9:ff:9a:8b:f6:d1:cb:e8:36:ad:
        56:dc:f0:4a:36:76:7e:3d:9c:bc:b9:5e:f7:01:9f:2a:
        46:6d:eb:b2:fb:37:8c:40:b7:cf:1c:cd:35:ba:07:09:
        ea:bf:2e:80:46:ab:b2:1f:7e:6b:a8:73:8c:31:91:89:
        1e:71:b1:5d:4c:d4:e2:f7:19:b3:ac:20:99:fb:18:10:
        77:1f:99:b2:8e:a8:0a:4c:df:11:d4:47:2f:0b:8c:27:
        9b:7a:76:e8:f9:4f:5a:2c:26:d7:38:53:a1:aa:ef:20
    Fingerprint (MD5):
        AC:BA:23:94:BD:E7:1D:15:2E:B5:3E:7E:23:2A:EC:71
    Fingerprint (SHA1):
        DD:EF:9D:C7:39:CB:ED:E5:3E:D8:E6:DD:7C:49:DF:92:A8:E7:76:50

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3577: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3578: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174391 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3579: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3580: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3581: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3582: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127174392   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3583: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3584: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3585: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3586: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127174393   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA1Root-1127174301.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3587: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3588: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3589: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3590: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127174394   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3591: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3592: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #3593: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174391 (0x432f50f7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:13 2012
            Not After : Tue Nov 28 01:44:13 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:cb:5e:95:c7:f8:4e:f7:14:95:71:76:d5:16:ab:8c:
                    22:1b:48:b3:40:b9:0b:f5:45:04:f2:9a:b8:d8:20:38:
                    8d:23:af:e3:e6:e4:1d:29:74:37:4b:50:a6:47:3d:bb:
                    e5:3a:d4:3b:2b:8c:f9:eb:61:6f:4c:8a:2e:7d:83:f5:
                    fe:ff:e1:15:14:ad:da:92:54:3f:7b:83:59:32:40:56:
                    57:35:6a:be:c3:e3:a6:de:5a:12:41:25:86:24:38:31:
                    7e:e5:b1:02:70:42:5e:4a:b6:2c:eb:d8:7c:28:9b:04:
                    fb:b0:ce:19:af:e3:e8:45:94:4c:9a:82:ab:cb:47:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        67:6b:7b:e5:4a:02:e7:f0:71:60:53:3e:af:f9:4f:e2:
        79:d5:3f:1b:ec:0a:7b:59:06:2c:5f:31:2a:65:7a:f6:
        56:79:e8:1e:1f:ca:32:22:b6:ae:18:3b:ec:4b:8e:d9:
        df:f9:26:25:57:fe:85:56:e8:b5:57:9f:c2:d6:10:a5:
        ac:b2:f1:4d:99:2d:ba:22:e0:79:82:25:d3:e2:ee:54:
        9c:0a:22:03:ae:2a:95:08:8a:ef:c6:ea:e1:1f:44:99:
        f6:4f:f0:02:72:c6:14:41:3b:da:55:e4:ae:40:6b:7d:
        20:14:32:70:19:f9:30:76:1b:eb:0d:73:42:df:b4:d9
    Fingerprint (MD5):
        96:71:20:94:AF:8B:82:FB:F3:80:53:CC:4D:41:FA:21
    Fingerprint (SHA1):
        58:5A:B6:9A:E0:11:84:F3:5B:DA:2F:60:9C:BA:B9:B5:EC:A6:35:B0


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3594: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3595: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174395 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3596: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3597: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3598: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174396 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3599: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3600: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3601: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3602: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127174397 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3603: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3604: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127174398 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3605: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3606: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3607: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3608: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3609: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127174399   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-Bridge-1127174302.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3610: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3611: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3612: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3613: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127174400   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3614: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3615: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3616: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3617: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174396 (0x432f50fc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:16 2012
            Not After : Tue Nov 28 01:44:16 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:b2:c7:73:a0:41:ff:c7:ad:66:86:5e:54:fa:b9:d4:
                    e3:c2:7a:ba:03:ef:5b:ab:5f:bf:42:c6:c0:d1:8a:90:
                    eb:37:b3:a2:96:e0:f2:b0:03:5e:b4:68:9a:93:70:cb:
                    17:9e:41:06:ca:6d:6a:45:1f:e0:aa:32:02:85:e6:82:
                    83:74:1d:7c:48:63:29:29:0b:45:98:c1:44:05:a4:0c:
                    83:49:ec:81:8a:dc:22:9d:cd:da:40:cc:ad:51:22:0a:
                    9d:22:4e:99:40:1e:b4:c2:56:38:58:d5:9a:6d:ff:23:
                    34:56:a7:b4:ab:8f:26:2d:d6:f6:dd:e3:0f:7c:50:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:97:72:a4:ca:98:0e:3f:ea:d4:ca:e5:5e:79:f8:5a:
        c2:70:ae:c7:72:3d:96:61:fb:e1:8c:61:10:93:0c:bf:
        dd:32:25:be:57:2a:4f:c2:ce:97:8b:a5:2d:98:b1:f6:
        fb:4d:b6:1f:1f:5b:4c:e9:d5:1c:d0:b8:c2:3b:0c:a2:
        33:da:d4:8c:d6:b1:67:c1:1e:a5:ed:2c:a5:1d:31:ae:
        6e:a5:e1:32:08:d5:d1:80:b9:66:e9:fe:0c:93:b5:5a:
        91:e4:ec:7b:b0:e2:53:b1:c1:ca:16:b9:81:b0:90:1d:
        6f:fc:be:2b:bc:49:f8:41:42:d6:ee:7c:7b:a3:39:89
    Fingerprint (MD5):
        BB:9A:70:88:BF:F8:00:29:FE:05:E9:1D:5D:EE:02:EC
    Fingerprint (SHA1):
        E7:D0:BC:FB:55:59:BA:F0:20:89:CB:F0:F9:2C:A6:40:20:1C:44:54


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3618: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174396 (0x432f50fc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:16 2012
            Not After : Tue Nov 28 01:44:16 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:b2:c7:73:a0:41:ff:c7:ad:66:86:5e:54:fa:b9:d4:
                    e3:c2:7a:ba:03:ef:5b:ab:5f:bf:42:c6:c0:d1:8a:90:
                    eb:37:b3:a2:96:e0:f2:b0:03:5e:b4:68:9a:93:70:cb:
                    17:9e:41:06:ca:6d:6a:45:1f:e0:aa:32:02:85:e6:82:
                    83:74:1d:7c:48:63:29:29:0b:45:98:c1:44:05:a4:0c:
                    83:49:ec:81:8a:dc:22:9d:cd:da:40:cc:ad:51:22:0a:
                    9d:22:4e:99:40:1e:b4:c2:56:38:58:d5:9a:6d:ff:23:
                    34:56:a7:b4:ab:8f:26:2d:d6:f6:dd:e3:0f:7c:50:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:97:72:a4:ca:98:0e:3f:ea:d4:ca:e5:5e:79:f8:5a:
        c2:70:ae:c7:72:3d:96:61:fb:e1:8c:61:10:93:0c:bf:
        dd:32:25:be:57:2a:4f:c2:ce:97:8b:a5:2d:98:b1:f6:
        fb:4d:b6:1f:1f:5b:4c:e9:d5:1c:d0:b8:c2:3b:0c:a2:
        33:da:d4:8c:d6:b1:67:c1:1e:a5:ed:2c:a5:1d:31:ae:
        6e:a5:e1:32:08:d5:d1:80:b9:66:e9:fe:0c:93:b5:5a:
        91:e4:ec:7b:b0:e2:53:b1:c1:ca:16:b9:81:b0:90:1d:
        6f:fc:be:2b:bc:49:f8:41:42:d6:ee:7c:7b:a3:39:89
    Fingerprint (MD5):
        BB:9A:70:88:BF:F8:00:29:FE:05:E9:1D:5D:EE:02:EC
    Fingerprint (SHA1):
        E7:D0:BC:FB:55:59:BA:F0:20:89:CB:F0:F9:2C:A6:40:20:1C:44:54


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3619: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3620: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174401 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3621: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3622: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3623: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174402 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3624: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3625: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3626: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3627: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127174403 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3628: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3629: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127174404 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3630: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3631: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3632: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3633: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3634: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127174405   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-Bridge-1127174303.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3635: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3636: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3637: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3638: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127174406   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3639: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3640: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3641: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3642: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127174407   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-BridgeNavy-1127174304.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3643: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3644: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3645: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3646: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127174408   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3647: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3648: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3649: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3650: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174402 (0x432f5102)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:21 2012
            Not After : Tue Nov 28 01:44:21 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e7:de:59:34:e6:9a:aa:7e:d1:68:a5:44:6c:a3:a7:1c:
                    66:04:70:11:72:fc:48:81:49:7b:6b:1e:dd:89:3b:ff:
                    43:ba:ca:91:af:cb:67:0e:59:bb:c5:63:a9:4a:1b:5a:
                    be:3e:28:05:d8:76:2b:8b:76:96:0c:40:a0:f2:b2:66:
                    79:71:2f:cb:de:47:a0:c8:93:2e:bd:ae:c3:ef:d1:21:
                    9a:85:80:e3:f5:0c:82:c4:c7:ec:c9:c9:a1:cf:cc:ff:
                    ee:3f:f7:b2:d7:5c:19:e1:a2:2a:3a:f2:f8:7f:47:73:
                    9e:f9:40:37:e9:87:6a:6a:08:87:27:85:83:21:f1:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        61:ef:df:33:0f:53:9e:9b:4c:5e:92:24:2f:53:a9:73:
        c4:73:ab:b7:3c:8c:81:c8:b1:79:fb:9b:6e:92:5c:46:
        d7:1e:8f:1b:e6:e3:37:77:45:6d:ac:d9:03:89:1c:26:
        54:09:95:48:04:3d:0f:57:91:12:b5:f3:8c:10:9e:73:
        1e:8f:86:4f:6e:10:64:49:b8:1e:ae:37:db:59:ad:d1:
        6e:0a:55:a4:d8:b5:25:16:20:11:8e:7f:43:0b:aa:23:
        cc:85:61:63:b4:f1:0d:14:20:ac:fa:04:a2:c9:11:e2:
        a7:f9:ca:fc:b9:bb:df:23:45:40:66:48:44:34:96:18
    Fingerprint (MD5):
        5F:7F:79:7D:7E:AB:C7:62:25:81:95:63:CB:A0:C2:77
    Fingerprint (SHA1):
        82:75:C5:4C:24:A7:77:E9:E0:E4:B8:30:4D:A6:76:83:0D:9F:FB:DF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3651: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174402 (0x432f5102)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:21 2012
            Not After : Tue Nov 28 01:44:21 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e7:de:59:34:e6:9a:aa:7e:d1:68:a5:44:6c:a3:a7:1c:
                    66:04:70:11:72:fc:48:81:49:7b:6b:1e:dd:89:3b:ff:
                    43:ba:ca:91:af:cb:67:0e:59:bb:c5:63:a9:4a:1b:5a:
                    be:3e:28:05:d8:76:2b:8b:76:96:0c:40:a0:f2:b2:66:
                    79:71:2f:cb:de:47:a0:c8:93:2e:bd:ae:c3:ef:d1:21:
                    9a:85:80:e3:f5:0c:82:c4:c7:ec:c9:c9:a1:cf:cc:ff:
                    ee:3f:f7:b2:d7:5c:19:e1:a2:2a:3a:f2:f8:7f:47:73:
                    9e:f9:40:37:e9:87:6a:6a:08:87:27:85:83:21:f1:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        61:ef:df:33:0f:53:9e:9b:4c:5e:92:24:2f:53:a9:73:
        c4:73:ab:b7:3c:8c:81:c8:b1:79:fb:9b:6e:92:5c:46:
        d7:1e:8f:1b:e6:e3:37:77:45:6d:ac:d9:03:89:1c:26:
        54:09:95:48:04:3d:0f:57:91:12:b5:f3:8c:10:9e:73:
        1e:8f:86:4f:6e:10:64:49:b8:1e:ae:37:db:59:ad:d1:
        6e:0a:55:a4:d8:b5:25:16:20:11:8e:7f:43:0b:aa:23:
        cc:85:61:63:b4:f1:0d:14:20:ac:fa:04:a2:c9:11:e2:
        a7:f9:ca:fc:b9:bb:df:23:45:40:66:48:44:34:96:18
    Fingerprint (MD5):
        5F:7F:79:7D:7E:AB:C7:62:25:81:95:63:CB:A0:C2:77
    Fingerprint (SHA1):
        82:75:C5:4C:24:A7:77:E9:E0:E4:B8:30:4D:A6:76:83:0D:9F:FB:DF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3652: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #3653: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174401 (0x432f5101)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:20 2012
            Not After : Tue Nov 28 01:44:20 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:f9:02:43:16:52:cc:79:d0:b8:e2:c8:f7:41:21:cf:
                    a9:8e:45:fb:ca:68:39:d1:40:fc:71:ff:aa:8e:72:f3:
                    ac:7b:fb:5c:b7:cb:a7:c5:36:72:7a:af:a8:b1:d1:93:
                    85:02:34:f4:75:48:65:19:00:ec:b8:7b:3e:68:57:42:
                    f6:9e:26:77:28:ab:69:e6:db:67:03:55:6f:ea:07:5a:
                    64:40:fb:6e:82:c2:7b:24:aa:98:99:e3:9f:f0:1e:56:
                    8e:be:11:8f:f8:71:33:47:e7:ef:e6:96:c3:64:1d:53:
                    1b:5e:fc:dd:d0:bb:d2:06:2d:38:f5:e1:7b:dc:83:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:02:fd:bd:11:5c:4f:8e:03:3f:9d:a9:ad:46:40:16:
        ff:c4:1e:e1:47:53:63:84:ee:c9:65:95:db:99:dd:73:
        90:4a:3e:1e:52:af:3a:9d:84:f5:53:f7:f3:8c:e1:cd:
        e9:9d:43:7a:c0:cd:5f:14:33:d4:41:b6:5f:f0:ca:a7:
        61:e3:13:2d:3f:92:27:12:21:69:60:09:c4:0d:29:90:
        8c:4a:63:9c:46:26:fd:00:6a:1b:40:86:07:3c:2c:36:
        05:31:80:f4:49:35:73:0c:a9:91:52:e6:8d:ab:e7:61:
        f2:8d:ca:e4:be:7f:79:81:6c:ef:e4:45:8a:8b:3d:75
    Fingerprint (MD5):
        58:27:CE:E2:27:65:A0:D1:B7:14:90:1C:FE:5F:19:E4
    Fingerprint (SHA1):
        A1:79:42:9C:B0:9D:5A:4C:AD:3A:27:2A:55:83:AD:61:BE:0A:BC:2D


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3654: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174402 (0x432f5102)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:21 2012
            Not After : Tue Nov 28 01:44:21 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e7:de:59:34:e6:9a:aa:7e:d1:68:a5:44:6c:a3:a7:1c:
                    66:04:70:11:72:fc:48:81:49:7b:6b:1e:dd:89:3b:ff:
                    43:ba:ca:91:af:cb:67:0e:59:bb:c5:63:a9:4a:1b:5a:
                    be:3e:28:05:d8:76:2b:8b:76:96:0c:40:a0:f2:b2:66:
                    79:71:2f:cb:de:47:a0:c8:93:2e:bd:ae:c3:ef:d1:21:
                    9a:85:80:e3:f5:0c:82:c4:c7:ec:c9:c9:a1:cf:cc:ff:
                    ee:3f:f7:b2:d7:5c:19:e1:a2:2a:3a:f2:f8:7f:47:73:
                    9e:f9:40:37:e9:87:6a:6a:08:87:27:85:83:21:f1:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        61:ef:df:33:0f:53:9e:9b:4c:5e:92:24:2f:53:a9:73:
        c4:73:ab:b7:3c:8c:81:c8:b1:79:fb:9b:6e:92:5c:46:
        d7:1e:8f:1b:e6:e3:37:77:45:6d:ac:d9:03:89:1c:26:
        54:09:95:48:04:3d:0f:57:91:12:b5:f3:8c:10:9e:73:
        1e:8f:86:4f:6e:10:64:49:b8:1e:ae:37:db:59:ad:d1:
        6e:0a:55:a4:d8:b5:25:16:20:11:8e:7f:43:0b:aa:23:
        cc:85:61:63:b4:f1:0d:14:20:ac:fa:04:a2:c9:11:e2:
        a7:f9:ca:fc:b9:bb:df:23:45:40:66:48:44:34:96:18
    Fingerprint (MD5):
        5F:7F:79:7D:7E:AB:C7:62:25:81:95:63:CB:A0:C2:77
    Fingerprint (SHA1):
        82:75:C5:4C:24:A7:77:E9:E0:E4:B8:30:4D:A6:76:83:0D:9F:FB:DF


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3655: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174402 (0x432f5102)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:21 2012
            Not After : Tue Nov 28 01:44:21 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e7:de:59:34:e6:9a:aa:7e:d1:68:a5:44:6c:a3:a7:1c:
                    66:04:70:11:72:fc:48:81:49:7b:6b:1e:dd:89:3b:ff:
                    43:ba:ca:91:af:cb:67:0e:59:bb:c5:63:a9:4a:1b:5a:
                    be:3e:28:05:d8:76:2b:8b:76:96:0c:40:a0:f2:b2:66:
                    79:71:2f:cb:de:47:a0:c8:93:2e:bd:ae:c3:ef:d1:21:
                    9a:85:80:e3:f5:0c:82:c4:c7:ec:c9:c9:a1:cf:cc:ff:
                    ee:3f:f7:b2:d7:5c:19:e1:a2:2a:3a:f2:f8:7f:47:73:
                    9e:f9:40:37:e9:87:6a:6a:08:87:27:85:83:21:f1:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        61:ef:df:33:0f:53:9e:9b:4c:5e:92:24:2f:53:a9:73:
        c4:73:ab:b7:3c:8c:81:c8:b1:79:fb:9b:6e:92:5c:46:
        d7:1e:8f:1b:e6:e3:37:77:45:6d:ac:d9:03:89:1c:26:
        54:09:95:48:04:3d:0f:57:91:12:b5:f3:8c:10:9e:73:
        1e:8f:86:4f:6e:10:64:49:b8:1e:ae:37:db:59:ad:d1:
        6e:0a:55:a4:d8:b5:25:16:20:11:8e:7f:43:0b:aa:23:
        cc:85:61:63:b4:f1:0d:14:20:ac:fa:04:a2:c9:11:e2:
        a7:f9:ca:fc:b9:bb:df:23:45:40:66:48:44:34:96:18
    Fingerprint (MD5):
        5F:7F:79:7D:7E:AB:C7:62:25:81:95:63:CB:A0:C2:77
    Fingerprint (SHA1):
        82:75:C5:4C:24:A7:77:E9:E0:E4:B8:30:4D:A6:76:83:0D:9F:FB:DF


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3656: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3657: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174409 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3658: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3659: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3660: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174410 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3661: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3662: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #3663: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CAArmyReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3664: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127174411   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3665: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #3666: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #3667: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CANavyReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3668: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127174412   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3669: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #3670: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3671: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3672: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127174413 -7 Bridge@CAArmy  --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3673: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #3674: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127174414 -7 Bridge@CANavy  --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3675: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #3676: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #3677: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3678: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3679: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127174415   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3680: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3681: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3682: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3683: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127174416   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3684: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3685: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3686: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3687: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127174417   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3688: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3689: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3690: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3691: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127174418   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3692: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3693: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3694: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174409 (0x432f5109)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:26 2012
            Not After : Tue Nov 28 01:44:26 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:24:d4:ee:f9:d4:b2:dd:db:24:e2:48:79:d0:53:eb:
                    0e:d5:83:ed:22:ed:d9:40:45:67:6e:d1:69:d7:cc:e6:
                    6e:ca:21:75:9b:bc:88:cb:07:bb:f9:45:42:01:28:8c:
                    21:26:fe:e4:c0:7e:1f:60:be:aa:be:8d:f5:45:d6:97:
                    80:50:92:11:ab:d3:33:4c:5d:e5:a9:8f:4e:a7:5a:a1:
                    83:7b:75:8f:f4:e5:ba:6d:e1:bf:c1:f6:97:77:9c:83:
                    e9:a9:09:ac:1b:a8:7e:f6:16:49:a8:45:1f:ad:62:c3:
                    15:9c:44:ac:11:bd:6c:af:41:08:b9:1c:56:2a:5c:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c4:d0:67:fa:64:97:14:4a:77:93:68:14:6d:c7:c0:00:
        e6:24:69:d2:2e:6b:79:09:4c:2b:90:0f:0b:f0:4d:c0:
        67:98:d2:b3:8a:6b:34:f0:20:b8:77:29:93:28:e1:9e:
        d5:e7:75:75:4e:45:cd:e9:3f:e3:80:54:aa:f6:0c:d0:
        44:bb:39:9c:22:74:3f:f3:d0:36:96:b0:bb:8f:b9:88:
        fd:2c:27:2a:d1:d5:15:fe:d7:47:86:4e:0b:81:88:2e:
        78:73:24:3e:f4:91:b6:4e:2a:ce:df:77:7a:51:c6:a4:
        ef:9e:1c:bd:b5:02:d9:bd:8a:67:28:fb:3a:73:99:00
    Fingerprint (MD5):
        8A:99:50:02:42:6F:7D:D8:9B:74:F5:09:7B:30:ED:FD
    Fingerprint (SHA1):
        DD:15:8A:0E:42:4E:96:D3:27:7A:8A:B9:60:A8:85:F9:E1:49:27:34


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3695: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3696: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3697: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3698: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3699: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3700: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3701: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3702: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3703: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174410 (0x432f510a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:27 2012
            Not After : Tue Nov 28 01:44:27 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:8f:6d:32:07:73:5e:e9:37:26:4d:64:ef:a2:6b:ba:
                    49:3e:b8:c4:bc:de:ac:9b:4e:42:32:5d:85:40:64:08:
                    e2:4c:04:2f:81:2d:10:5f:40:d2:7f:f0:6e:a4:0b:c1:
                    4f:b3:fd:8d:08:35:d3:1e:4e:15:7b:94:ea:08:da:81:
                    0e:0f:4e:5a:d9:93:f4:2b:1f:38:3d:2a:dc:48:71:e8:
                    66:6b:48:72:82:1e:f1:03:98:d8:b1:36:0c:8a:3c:7d:
                    e3:a4:f6:cb:73:59:51:67:3f:c1:dd:33:cf:d2:8b:1e:
                    16:a5:1b:2a:32:f3:99:8d:e0:65:5a:dd:f3:02:e5:d3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        47:bc:90:21:70:2d:9d:19:11:ef:c8:ea:50:7a:df:4c:
        c3:d1:4d:c2:3d:9e:a6:4a:48:5b:e3:8d:91:89:75:57:
        fd:e6:ac:df:8f:9d:3e:b8:10:40:2b:3d:f5:06:71:ee:
        b4:ae:0d:ae:c0:97:17:53:d0:b1:0e:2c:b0:6b:b6:51:
        81:cf:a6:c5:3e:00:22:74:50:35:07:66:14:7c:8b:21:
        4c:07:41:42:f2:2b:d9:e3:7a:af:87:14:16:18:5d:42:
        75:5f:63:5b:4e:52:7f:30:f3:59:50:ea:22:41:b1:72:
        9d:e2:7b:7d:bd:c2:90:fe:8e:19:71:ec:6a:60:44:1d
    Fingerprint (MD5):
        2F:F7:46:85:11:C8:E7:3F:E8:B3:F8:48:82:83:EA:18
    Fingerprint (SHA1):
        E3:39:EC:E6:BC:74:75:56:91:EF:A9:FB:9C:34:8C:B0:2C:C2:F0:87


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3704: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3705: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3706: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3707: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3708: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3709: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3710: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #3711: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #3712: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #3713: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #3714: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #3715: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #3716: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #3717: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3718: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3719: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #3720: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #3721: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3722: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174419 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3723: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3724: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3725: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3726: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127174420   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3727: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3728: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3729: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3730: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127174421   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3731: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3732: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3733: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3734: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127174422   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3735: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #3736: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3737: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3738: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127174423   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3739: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3740: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3741: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3742: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127174424   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3743: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #3744: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3745: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3746: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127174425   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3747: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #3748: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #3749: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3750: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127174426   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3751: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #3752: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3753: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3754: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127174427   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3755: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #3756: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3757: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174419 (0x432f5113)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:37 2012
            Not After : Tue Nov 28 01:44:37 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    30:78:13:45:87:35:29:bd:36:df:bb:c6:e3:32:ae:07:
                    a3:f7:b1:ec:37:d8:51:67:e2:8e:91:ee:55:06:39:be:
                    cd:b4:ee:f9:26:a9:33:ee:ef:87:86:66:8e:04:46:9c:
                    eb:c2:0a:55:19:48:0a:4a:36:f2:cd:4e:45:57:1c:75:
                    4c:80:65:68:36:0a:b9:85:47:84:4f:e9:67:d3:51:40:
                    2d:49:2e:5c:70:84:a4:2e:43:50:34:61:71:97:ca:e5:
                    f6:f0:7b:76:5e:f8:2a:91:85:cb:98:f0:14:8f:ce:10:
                    5e:6f:41:f2:22:cb:4d:ac:25:b9:68:8e:33:c8:04:32
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:aa:04:98:db:ae:9a:e1:50:65:46:74:
        f8:c5:bb:ab:cd:a9:8b:ad:b0:02:14:2f:14:05:87:80:
        f5:d8:ba:78:29:ea:77:96:ab:af:43:e3:85:f2:6c
    Fingerprint (MD5):
        A4:11:27:F6:44:DD:BE:55:64:C7:69:FA:A1:87:2D:1F
    Fingerprint (SHA1):
        60:E4:03:61:1C:35:48:D4:0B:E6:10:5F:F0:2F:03:9A:A4:4F:FB:B8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3758: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174419 (0x432f5113)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:37 2012
            Not After : Tue Nov 28 01:44:37 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    30:78:13:45:87:35:29:bd:36:df:bb:c6:e3:32:ae:07:
                    a3:f7:b1:ec:37:d8:51:67:e2:8e:91:ee:55:06:39:be:
                    cd:b4:ee:f9:26:a9:33:ee:ef:87:86:66:8e:04:46:9c:
                    eb:c2:0a:55:19:48:0a:4a:36:f2:cd:4e:45:57:1c:75:
                    4c:80:65:68:36:0a:b9:85:47:84:4f:e9:67:d3:51:40:
                    2d:49:2e:5c:70:84:a4:2e:43:50:34:61:71:97:ca:e5:
                    f6:f0:7b:76:5e:f8:2a:91:85:cb:98:f0:14:8f:ce:10:
                    5e:6f:41:f2:22:cb:4d:ac:25:b9:68:8e:33:c8:04:32
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:aa:04:98:db:ae:9a:e1:50:65:46:74:
        f8:c5:bb:ab:cd:a9:8b:ad:b0:02:14:2f:14:05:87:80:
        f5:d8:ba:78:29:ea:77:96:ab:af:43:e3:85:f2:6c
    Fingerprint (MD5):
        A4:11:27:F6:44:DD:BE:55:64:C7:69:FA:A1:87:2D:1F
    Fingerprint (SHA1):
        60:E4:03:61:1C:35:48:D4:0B:E6:10:5F:F0:2F:03:9A:A4:4F:FB:B8


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3759: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174419 (0x432f5113)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:37 2012
            Not After : Tue Nov 28 01:44:37 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    30:78:13:45:87:35:29:bd:36:df:bb:c6:e3:32:ae:07:
                    a3:f7:b1:ec:37:d8:51:67:e2:8e:91:ee:55:06:39:be:
                    cd:b4:ee:f9:26:a9:33:ee:ef:87:86:66:8e:04:46:9c:
                    eb:c2:0a:55:19:48:0a:4a:36:f2:cd:4e:45:57:1c:75:
                    4c:80:65:68:36:0a:b9:85:47:84:4f:e9:67:d3:51:40:
                    2d:49:2e:5c:70:84:a4:2e:43:50:34:61:71:97:ca:e5:
                    f6:f0:7b:76:5e:f8:2a:91:85:cb:98:f0:14:8f:ce:10:
                    5e:6f:41:f2:22:cb:4d:ac:25:b9:68:8e:33:c8:04:32
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:aa:04:98:db:ae:9a:e1:50:65:46:74:
        f8:c5:bb:ab:cd:a9:8b:ad:b0:02:14:2f:14:05:87:80:
        f5:d8:ba:78:29:ea:77:96:ab:af:43:e3:85:f2:6c
    Fingerprint (MD5):
        A4:11:27:F6:44:DD:BE:55:64:C7:69:FA:A1:87:2D:1F
    Fingerprint (SHA1):
        60:E4:03:61:1C:35:48:D4:0B:E6:10:5F:F0:2F:03:9A:A4:4F:FB:B8


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3760: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174419 (0x432f5113)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:37 2012
            Not After : Tue Nov 28 01:44:37 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    30:78:13:45:87:35:29:bd:36:df:bb:c6:e3:32:ae:07:
                    a3:f7:b1:ec:37:d8:51:67:e2:8e:91:ee:55:06:39:be:
                    cd:b4:ee:f9:26:a9:33:ee:ef:87:86:66:8e:04:46:9c:
                    eb:c2:0a:55:19:48:0a:4a:36:f2:cd:4e:45:57:1c:75:
                    4c:80:65:68:36:0a:b9:85:47:84:4f:e9:67:d3:51:40:
                    2d:49:2e:5c:70:84:a4:2e:43:50:34:61:71:97:ca:e5:
                    f6:f0:7b:76:5e:f8:2a:91:85:cb:98:f0:14:8f:ce:10:
                    5e:6f:41:f2:22:cb:4d:ac:25:b9:68:8e:33:c8:04:32
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:aa:04:98:db:ae:9a:e1:50:65:46:74:
        f8:c5:bb:ab:cd:a9:8b:ad:b0:02:14:2f:14:05:87:80:
        f5:d8:ba:78:29:ea:77:96:ab:af:43:e3:85:f2:6c
    Fingerprint (MD5):
        A4:11:27:F6:44:DD:BE:55:64:C7:69:FA:A1:87:2D:1F
    Fingerprint (SHA1):
        60:E4:03:61:1C:35:48:D4:0B:E6:10:5F:F0:2F:03:9A:A4:4F:FB:B8


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #3761: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3762: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 10 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3763: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3764: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3765: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA0Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3766: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3767: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3768: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3769: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3770: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3771: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3772: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3773: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE11Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3774: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3775: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3776: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #3777: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3778: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3779: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #3780: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3781: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3782: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3783: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3784: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3785: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3786: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3787: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #3788: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128014448Z
nextupdate=20131128014448Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 01:44:48 2012
    Next Update: Thu Nov 28 01:44:48 2013
    CRL Extensions:
chains.sh: #3789: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128014448Z
nextupdate=20131128014448Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:44:48 2012
    Next Update: Thu Nov 28 01:44:48 2013
    CRL Extensions:
chains.sh: #3790: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128014448Z
nextupdate=20131128014448Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 01:44:48 2012
    Next Update: Thu Nov 28 01:44:48 2013
    CRL Extensions:
chains.sh: #3791: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128014448Z
nextupdate=20131128014448Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 01:44:48 2012
    Next Update: Thu Nov 28 01:44:48 2013
    CRL Extensions:
chains.sh: #3792: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128014449Z
addcert 14 20121128014449Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 01:44:49 2012
    Next Update: Thu Nov 28 01:44:48 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 01:44:49 2012
    CRL Extensions:
chains.sh: #3793: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128014451Z
addcert 15 20121128014451Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:44:51 2012
    Next Update: Thu Nov 28 01:44:48 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 01:44:51 2012
    CRL Extensions:
chains.sh: #3794: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3795: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3796: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #3797: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #3798: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #3799: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #3800: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #3801: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #3802: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #3803: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:44 2012
            Not After : Tue Nov 28 01:44:44 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:0f:46:34:5f:7b:a8:cb:67:26:a4:56:f1:1d:5a:88:
                    74:f4:76:6a:26:ab:7a:46:40:db:54:00:b1:a4:d1:4c:
                    0c:69:46:e1:dc:f9:b3:dd:0b:ee:63:40:15:8c:c1:64:
                    cd:8e:e2:c2:e9:70:60:e2:f4:b3:0f:c7:d2:48:c2:2f:
                    a5:b0:e3:52:72:a6:da:9b:c6:b1:09:e6:50:b6:51:36:
                    69:23:35:2b:33:f2:0b:03:ab:c4:e6:11:6d:19:d7:1b:
                    17:70:ca:2c:d9:b2:0c:50:7b:f9:b1:2a:d2:97:f3:75:
                    7c:f5:ab:ad:85:40:7e:81:ef:4a:9f:19:8f:5f:1e:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        33:44:9f:8b:83:b2:32:31:f7:ca:45:ee:fa:b7:a5:97:
        99:d3:ba:47:bd:ce:83:da:99:f5:fd:97:c3:8e:38:be:
        be:8b:ea:99:18:4e:55:12:1d:b7:dd:d1:3f:37:1d:f9:
        11:43:14:fa:46:b3:41:58:82:17:46:9b:5f:b1:78:de:
        3b:64:f7:b2:d9:61:aa:72:9b:bb:86:82:31:22:44:64:
        c4:71:8e:39:24:2d:af:3d:94:d0:02:20:b9:20:79:d4:
        76:81:77:f6:55:db:cd:b8:8f:22:55:8e:8f:f9:63:d9:
        85:75:85:e4:48:c6:bb:40:06:57:bd:9a:77:fc:c4:40
    Fingerprint (MD5):
        98:16:71:A1:69:C2:7C:5A:56:26:AE:42:56:6E:BF:41
    Fingerprint (SHA1):
        96:E6:D4:5D:EA:C4:58:1E:4D:BF:14:F8:73:7F:27:8A:A1:9D:6A:78

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3804: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3805: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:44:44 2012
            Not After : Tue Nov 28 01:44:44 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:0f:46:34:5f:7b:a8:cb:67:26:a4:56:f1:1d:5a:88:
                    74:f4:76:6a:26:ab:7a:46:40:db:54:00:b1:a4:d1:4c:
                    0c:69:46:e1:dc:f9:b3:dd:0b:ee:63:40:15:8c:c1:64:
                    cd:8e:e2:c2:e9:70:60:e2:f4:b3:0f:c7:d2:48:c2:2f:
                    a5:b0:e3:52:72:a6:da:9b:c6:b1:09:e6:50:b6:51:36:
                    69:23:35:2b:33:f2:0b:03:ab:c4:e6:11:6d:19:d7:1b:
                    17:70:ca:2c:d9:b2:0c:50:7b:f9:b1:2a:d2:97:f3:75:
                    7c:f5:ab:ad:85:40:7e:81:ef:4a:9f:19:8f:5f:1e:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        33:44:9f:8b:83:b2:32:31:f7:ca:45:ee:fa:b7:a5:97:
        99:d3:ba:47:bd:ce:83:da:99:f5:fd:97:c3:8e:38:be:
        be:8b:ea:99:18:4e:55:12:1d:b7:dd:d1:3f:37:1d:f9:
        11:43:14:fa:46:b3:41:58:82:17:46:9b:5f:b1:78:de:
        3b:64:f7:b2:d9:61:aa:72:9b:bb:86:82:31:22:44:64:
        c4:71:8e:39:24:2d:af:3d:94:d0:02:20:b9:20:79:d4:
        76:81:77:f6:55:db:cd:b8:8f:22:55:8e:8f:f9:63:d9:
        85:75:85:e4:48:c6:bb:40:06:57:bd:9a:77:fc:c4:40
    Fingerprint (MD5):
        98:16:71:A1:69:C2:7C:5A:56:26:AE:42:56:6E:BF:41
    Fingerprint (SHA1):
        96:E6:D4:5D:EA:C4:58:1E:4D:BF:14:F8:73:7F:27:8A:A1:9D:6A:78

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3806: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3807: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #3808: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #3809: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3810: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #3811: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3812: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128014453Z
nextupdate=20131128014453Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 01:44:53 2012
    Next Update: Thu Nov 28 01:44:53 2013
    CRL Extensions:
chains.sh: #3813: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128014454Z
addcert 3 20121128014454Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 01:44:54 2012
    Next Update: Thu Nov 28 01:44:53 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 01:44:54 2012
    CRL Extensions:
chains.sh: #3814: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128014455Z
addcert 4 20121128014455Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 01:44:55 2012
    Next Update: Thu Nov 28 01:44:53 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 01:44:55 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 01:44:54 2012
    CRL Extensions:
chains.sh: #3815: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3816: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3817: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3818: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3819: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3820: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3821: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3822: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3823: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3824: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3825: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3826: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #3827: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3828: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3829: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #3830: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3831: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3832: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #3833: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3834: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3835: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3836: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -m 1127174428 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3837: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3838: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3839: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA0Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3840: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127174429   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3841: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3842: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3843: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA1Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127174318.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3844: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127174305.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3845: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3846: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3847: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE11Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127174318.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3848: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127174430   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3849: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3850: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3851: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o CA2Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127174318.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3852: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127174306.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3853: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3854: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3855: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3856: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127174431   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===

===
chains.sh: #3857: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #3858: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3859: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE1Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127174318.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3860: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127174307.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3861: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #3862: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3863: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/tests_noise -o EE2Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127174318.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3864: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127174308.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3865: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #3866: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128014510Z
nextupdate=20131128014510Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 01:45:10 2012
    Next Update: Thu Nov 28 01:45:10 2013
    CRL Extensions:
chains.sh: #3867: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128014510Z
nextupdate=20131128014510Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:45:10 2012
    Next Update: Thu Nov 28 01:45:10 2013
    CRL Extensions:
chains.sh: #3868: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128014510Z
nextupdate=20131128014510Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 01:45:10 2012
    Next Update: Thu Nov 28 01:45:10 2013
    CRL Extensions:
chains.sh: #3869: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128014510Z
nextupdate=20131128014510Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 01:45:10 2012
    Next Update: Thu Nov 28 01:45:10 2013
    CRL Extensions:
chains.sh: #3870: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128014511Z
addcert 20 20121128014511Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:45:11 2012
    Next Update: Thu Nov 28 01:45:10 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 01:45:11 2012
    CRL Extensions:
chains.sh: #3871: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128014512Z
addcert 40 20121128014512Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:45:12 2012
    Next Update: Thu Nov 28 01:45:10 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 01:45:11 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 01:45:12 2012
    CRL Extensions:
chains.sh: #3872: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3873: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3874: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #3875: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174428 (0x432f511c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:45:05 2012
            Not After : Tue Nov 28 01:45:05 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:1e:44:6d:0a:8a:09:14:ab:87:03:d0:5a:e6:86:5b:
                    1e:fd:80:8b:86:2d:bd:6c:f0:30:a3:a5:ca:c0:96:c2:
                    2a:e2:27:b5:13:bc:20:17:85:2d:15:80:77:05:b8:18:
                    aa:91:b6:c5:eb:f0:2b:35:c2:17:52:e9:35:ed:c5:98:
                    4c:ae:16:a8:ed:8e:44:c7:27:08:87:d3:43:ee:57:30:
                    7b:66:fa:ac:ff:76:a0:f2:ac:f6:40:0f:10:48:2a:b1:
                    b3:53:dd:13:bc:0d:e0:19:f3:ea:36:df:a5:56:1c:08:
                    ff:43:21:08:36:6a:11:43:1d:49:75:89:fb:dc:4b:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b3:44:a1:d1:4a:10:b0:0b:00:56:ca:3a:cf:1c:e0:4c:
        97:07:cf:7b:b5:83:10:20:da:7b:d4:5e:98:c2:66:23:
        92:b8:26:11:6b:7a:8e:c3:0f:61:d3:f9:57:f0:c6:d0:
        a6:c1:21:5a:50:51:dc:b4:9f:0a:f4:3c:54:18:60:35:
        b5:26:5e:b7:1f:8c:36:53:68:e1:ba:83:dd:f2:81:e3:
        82:70:a0:f6:8a:59:82:9b:3d:69:58:28:e0:f0:f9:d3:
        3b:56:86:ee:b1:c7:6e:1f:4f:6d:0f:b6:33:6a:cf:ad:
        66:44:fb:e3:ad:95:37:b0:af:70:26:ca:fb:95:1a:44
    Fingerprint (MD5):
        D2:80:6B:8F:93:67:CD:C6:B1:48:E0:F3:CE:83:28:D8
    Fingerprint (SHA1):
        F2:99:6F:E2:FC:38:E2:35:ED:E2:61:80:79:EE:44:A3:AA:68:9F:CD

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3876: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3877: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127174428 (0x432f511c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:45:05 2012
            Not After : Tue Nov 28 01:45:05 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:1e:44:6d:0a:8a:09:14:ab:87:03:d0:5a:e6:86:5b:
                    1e:fd:80:8b:86:2d:bd:6c:f0:30:a3:a5:ca:c0:96:c2:
                    2a:e2:27:b5:13:bc:20:17:85:2d:15:80:77:05:b8:18:
                    aa:91:b6:c5:eb:f0:2b:35:c2:17:52:e9:35:ed:c5:98:
                    4c:ae:16:a8:ed:8e:44:c7:27:08:87:d3:43:ee:57:30:
                    7b:66:fa:ac:ff:76:a0:f2:ac:f6:40:0f:10:48:2a:b1:
                    b3:53:dd:13:bc:0d:e0:19:f3:ea:36:df:a5:56:1c:08:
                    ff:43:21:08:36:6a:11:43:1d:49:75:89:fb:dc:4b:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b3:44:a1:d1:4a:10:b0:0b:00:56:ca:3a:cf:1c:e0:4c:
        97:07:cf:7b:b5:83:10:20:da:7b:d4:5e:98:c2:66:23:
        92:b8:26:11:6b:7a:8e:c3:0f:61:d3:f9:57:f0:c6:d0:
        a6:c1:21:5a:50:51:dc:b4:9f:0a:f4:3c:54:18:60:35:
        b5:26:5e:b7:1f:8c:36:53:68:e1:ba:83:dd:f2:81:e3:
        82:70:a0:f6:8a:59:82:9b:3d:69:58:28:e0:f0:f9:d3:
        3b:56:86:ee:b1:c7:6e:1f:4f:6d:0f:b6:33:6a:cf:ad:
        66:44:fb:e3:ad:95:37:b0:af:70:26:ca:fb:95:1a:44
    Fingerprint (MD5):
        D2:80:6B:8F:93:67:CD:C6:B1:48:E0:F3:CE:83:28:D8
    Fingerprint (SHA1):
        F2:99:6F:E2:FC:38:E2:35:ED:E2:61:80:79:EE:44:A3:AA:68:9F:CD

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3878: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3879: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 67760 at Tue Nov 27 17:45:13 PST 2012
kill -USR1 67760
selfserv: normal termination
httpserv with PID 67760 killed at Tue Nov 27 17:45:13 PST 2012
TIMESTAMP chains END: Tue Nov 27 17:45:13 PST 2012
chains.sh: Testing with PKIX ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 17:45:13 PST 2012
lowhash.sh: Lowhash Tests ===============================
freebl lowhash not supported in this plaform.
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 17:45:13 PST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Tue Nov 27 17:45:13 PST 2012
TIMESTAMP libpkix END: Tue Nov 27 17:45:13 PST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 17:45:13 PST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #3880: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -f ../tests.pw
cert.sh: #3881: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3882: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3883: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -o root.cert
cert.sh: #3884: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -f ../tests.pw
cert.sh: #3885: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3886: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3887: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -o root.cert
cert.sh: #3888: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3889: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -o root.cert
cert.sh: #3890: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3891: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -o root.cert
cert.sh: #3892: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -f ../tests.pw
cert.sh: #3893: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3894: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3895: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -o root.cert
cert.sh: #3896: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3897: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -o root.cert
cert.sh: #3898: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3899: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -o root.cert
cert.sh: #3900: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3901: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #3902: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3903: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #3904: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3905: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #3906: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3907: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #3908: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3909: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #3910: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3911: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #3912: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #3913: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #3914: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -f ../tests.pw
cert.sh: #3915: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3916: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3917: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com.cert -f ../tests.pw
cert.sh: #3918: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com.cert
cert.sh: #3919: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #3920: Import Client Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3921: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert -f ../tests.pw
cert.sh: #3922: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert
cert.sh: #3923: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #3924: Import Client EC Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3925: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw
cert.sh: #3926: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #3927: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #3928: Import chain-1-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/chain-1-serverCA.ca.cert
cert.sh: #3929: Import chain-1-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #3930: Import chain-2-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/chain-2-serverCA.ca.cert
cert.sh: #3931: Import chain-2-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #3932: Import serverCA-ec CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #3933: Import serverCA CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -f ../tests.pw
cert.sh: #3934: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3935: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3936: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #3937: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #3938: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #3939: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3940: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #3941: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #3942: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #3943: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3944: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #3945: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #3946: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #3947: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/chain-1-clientCA.ca.cert
cert.sh: #3948: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #3949: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/chain-2-clientCA.ca.cert
cert.sh: #3950: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #3951: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #3952: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw
cert.sh: #3953: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3954: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -i ../CA/TestCA.ca.cert
cert.sh: #3955: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #3956: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3957: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #3958: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser.cert
cert.sh: #3959: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3960: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #3961: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #3962: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3963: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #3964: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #3965: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             nss-vm-darwin9-1.community.scl3.mozilla.com ------------------------------------
cert.sh: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw
cert.sh: #3966: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB - PASSED
cert.sh: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3967: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB - PASSED
cert.sh: Import Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -i ../CA/TestCA.ca.cert
cert.sh: #3968: Import Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Import EC Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #3969: Import EC Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3970: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com.cert -f ../tests.pw 
cert.sh: #3971: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com.cert
cert.sh: #3972: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's Cert Created
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3973: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert -f ../tests.pw 
cert.sh: #3974: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert
cert.sh: #3975: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3976: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw 
cert.sh: #3977: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request with RSA - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #3978: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             nss-vm-darwin9-1.community.scl3.mozilla.com-sni --------------------------------
cert.sh: Generate Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3979: Generate Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com.cert -f ../tests.pw 
cert.sh: #3980: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Request - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com.cert
cert.sh: #3981: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert Created
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3982: Generate EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec.cert -f ../tests.pw 
cert.sh: #3983: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec.cert
cert.sh: #3984: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3985: Generate mixed EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw 
cert.sh: #3986: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request with RSA - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #3987: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw
cert.sh: #3988: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server -f ../tests.pw
cert.sh: #3989: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw
cert.sh: #3990: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #3991: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #3992: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #3993: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3994: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #3995: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #3996: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #3997: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #3998: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #3999: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4000: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #4001: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #4002: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw
cert.sh: #4003: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4004: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #4005: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4006: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4007: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #4008: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #4009: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4010: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #4011: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #4012: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4013: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #4014: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #4015: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw
cert.sh: #4016: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4017: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -i ../CA/TestCA.ca.cert
cert.sh: #4018: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #4019: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4020: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #4021: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw -i Dave.cert
cert.sh: #4022: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4023: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #4024: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #4025: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4026: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #4027: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #4028: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw
cert.sh: #4029: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4030: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -i ../CA/TestCA.ca.cert
cert.sh: #4031: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #4032: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4033: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4034: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw -i Eve.cert
cert.sh: #4035: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4036: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4037: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #4038: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4039: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4040: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #4041: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #4042: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4043: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4044: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4045: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4046: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #4047: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4048: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4049: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips -f ../tests.fipspw
cert.sh: #4050: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4051: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #4052: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #4053: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw
cert.sh: #4054: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4055: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #4056: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4057: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #4058: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #4059: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4060: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #4061: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #4062: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4063: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #4064: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #4065: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4066: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #4067: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #4068: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4069: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #4070: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #4071: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4072: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #4073: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #4074: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4075: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #4076: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #4077: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4078: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #4079: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #4080: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4081: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #4082: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #4083: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4084: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #4085: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #4086: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4087: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #4088: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #4089: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4090: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #4091: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #4092: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4093: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #4094: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #4095: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4096: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #4097: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #4098: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4099: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #4100: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #4101: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4102: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #4103: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #4104: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4105: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #4106: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #4107: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4108: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #4109: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #4110: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4111: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #4112: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #4113: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4114: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #4115: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #4116: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4117: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #4118: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #4119: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4120: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #4121: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #4122: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4123: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #4124: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #4125: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4126: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #4127: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #4128: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4129: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #4130: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #4131: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4132: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #4133: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #4134: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4135: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #4136: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #4137: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4138: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #4139: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #4140: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4141: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #4142: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #4143: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4144: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #4145: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #4146: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4147: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #4148: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #4149: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4150: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #4151: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #4152: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4153: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #4154: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #4155: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4156: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #4157: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #4158: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4159: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #4160: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #4161: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4162: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #4163: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #4164: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4165: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #4166: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #4167: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4168: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #4169: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #4170: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4171: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #4172: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #4173: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4174: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #4175: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #4176: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4177: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #4178: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #4179: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4180: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #4181: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #4182: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4183: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #4184: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #4185: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4186: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #4187: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #4188: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4189: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #4190: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #4191: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4192: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #4193: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #4194: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4195: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #4196: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #4197: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4198: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #4199: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #4200: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4201: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #4202: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #4203: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4204: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #4205: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #4206: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4207: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #4208: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #4209: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4210: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #4211: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #4212: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4213: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #4214: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #4215: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4216: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #4217: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #4218: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4219: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #4220: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #4221: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4222: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #4223: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #4224: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4225: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #4226: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #4227: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4228: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #4229: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #4230: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4231: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #4232: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #4233: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4234: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #4235: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #4236: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4237: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #4238: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #4239: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4240: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #4241: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #4242: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4243: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #4244: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #4245: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4246: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #4247: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #4248: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4249: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #4250: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #4251: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4252: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #4253: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #4254: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4255: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #4256: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #4257: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4258: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #4259: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #4260: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4261: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #4262: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #4263: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4264: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #4265: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #4266: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw
cert.sh: #4267: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4268: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #4269: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #4270: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4271: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #4272: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #4273: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4274: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #4275: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #4276: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4277: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #4278: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #4279: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:8f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:07 2012
            Not After : Thu Feb 28 01:46:07 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:51:68:f6:5e:ce:53:a4:40:92:84:42:a4:a3:f9:38:
                    c6:2b:47:b4:b5:1b:1c:0b:e8:6b:ac:75:f5:84:d4:3f:
                    e9:31:5d:02:07:62:8a:52:d1:1f:5e:b2:18:da:bd:a1:
                    cc:b3:4e:5a:3d:62:aa:ec:96:d0:ab:8d:08:c0:40:58:
                    22:dd:86:01:14:60:cc:5d:8d:1d:ab:6b:06:70:5e:f4:
                    38:ee:d9:d4:b9:0d:c8:46:70:97:cd:53:9b:72:a3:79:
                    73:bb:fd:db:6b:1c:56:18:df:9e:de:63:5f:fe:75:35:
                    00:ba:3f:f6:5c:47:ca:6d:59:fe:d1:83:0b:ec:cf:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        28:1c:ce:4f:eb:66:c1:98:78:75:af:92:ff:fe:af:5c:
        06:5d:7b:db:44:1d:c0:f8:8f:94:a6:0e:fb:0a:90:01:
        c5:a3:80:42:25:37:e3:a2:d8:1a:97:ca:63:39:3c:04:
        92:6d:7d:b2:60:b3:21:65:98:bc:b8:3f:86:3c:a3:b3:
        7d:65:51:88:33:98:4a:9c:13:69:0e:1e:aa:24:6a:f9:
        a7:4b:c6:f9:10:1a:dc:8b:55:16:31:40:04:0e:28:25:
        86:67:17:92:e2:1a:39:f1:63:e1:8a:27:f0:cb:6e:69:
        63:0b:4a:74:7c:45:6b:03:46:b0:15:f8:45:22:88:22
    Fingerprint (MD5):
        1B:FB:CF:50:6E:D8:0F:12:56:AD:99:16:29:B3:0D:B6
    Fingerprint (SHA1):
        90:DE:8D:79:61:F1:04:6F:B9:0E:45:92:6D:C9:34:A2:F5:31:FE:8B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4280: Certificate Key Usage Extension (1) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:91
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:08 2012
            Not After : Thu Feb 28 01:46:08 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:9b:27:64:32:44:d9:c2:a3:f5:fa:d5:e0:a7:5c:2e:
                    9e:0d:99:07:76:c9:ff:cf:0d:e6:00:2d:ae:58:81:79:
                    42:26:92:f1:62:c5:d9:83:25:93:34:11:8d:c0:ee:db:
                    e1:8d:4c:a9:5a:d3:54:85:f0:48:81:f2:5c:e2:15:93:
                    c0:55:2d:6c:d2:11:b3:5d:52:83:c7:75:ec:f6:75:43:
                    3b:b8:24:d4:70:68:3f:2a:f2:26:4e:6e:f5:c2:09:f5:
                    c5:25:54:dc:a7:a4:ff:02:e0:c5:c2:b4:6a:0d:c0:53:
                    59:b7:07:d5:62:46:9a:ef:50:39:d1:2e:59:50:7a:ad
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        82:d0:2e:db:b4:40:1c:30:a7:aa:c5:d7:ee:b4:01:91:
        9e:c1:a3:7f:60:4f:12:36:cf:43:e0:ff:82:43:2e:63:
        03:64:83:15:42:3b:0b:b5:3a:2e:87:30:d5:64:5d:32:
        35:3f:cf:8e:d3:2d:71:a5:1e:ce:57:f5:0b:7e:83:9e:
        8e:00:3a:8c:4a:9a:3a:90:85:bb:52:bd:0e:78:6b:de:
        cd:9a:e6:19:28:5e:23:c9:a7:60:ab:e7:de:e8:31:30:
        29:5a:4f:21:d9:af:ce:78:31:9d:03:0f:07:3d:69:43:
        2a:ff:09:ca:e3:0e:0e:c9:c5:c1:35:0a:25:3a:19:b4
    Fingerprint (MD5):
        93:4E:C2:49:DB:CC:BC:12:CE:BC:EA:E4:F9:2A:07:35
    Fingerprint (SHA1):
        CD:D7:56:BB:F3:54:8F:70:7A:A6:99:2C:9B:69:28:F5:A7:62:A5:B4

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4281: Certificate Key Usage Extension (2) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:92
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:08 2012
            Not After : Thu Feb 28 01:46:08 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:b9:08:ed:35:95:5c:6c:8d:2d:f1:ad:14:26:75:36:
                    74:76:01:8b:8a:bf:5f:0c:02:e5:2c:e3:fd:22:18:6d:
                    38:45:49:95:d6:0a:37:91:c8:74:5b:44:b5:fd:4d:a6:
                    9a:d9:dd:81:c0:75:ad:d0:61:6a:db:53:17:c1:4f:5d:
                    40:29:ff:2c:92:64:46:ae:4c:e5:86:db:ae:4a:32:1f:
                    53:fc:95:8f:d5:6c:3a:8f:eb:51:3d:09:ed:a2:7f:48:
                    d4:25:06:97:99:1f:02:19:f4:96:37:0f:1c:13:9d:eb:
                    5e:4a:ff:f9:65:c1:9a:d3:8e:b5:a6:22:66:b7:54:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6a:23:b5:9d:ad:1a:70:ec:c2:8c:28:17:a5:05:15:37:
        64:8f:cd:e4:43:bf:e5:34:72:78:3e:51:e6:7b:3c:16:
        99:39:af:a3:94:e2:dc:28:e6:ed:99:20:06:64:80:21:
        6e:bb:1b:c7:ce:55:6a:54:b9:b1:d0:9b:6a:00:2d:56:
        ae:91:9b:65:4f:6a:92:7b:e6:f5:2c:ff:fc:a9:99:7c:
        a8:99:6e:63:75:75:76:fa:07:42:66:93:71:cd:17:71:
        2a:ab:c6:fb:20:48:28:fa:a6:78:1d:da:5f:1e:4f:76:
        db:ac:6f:c3:65:87:aa:49:4b:69:f9:f2:b1:39:96:6c
    Fingerprint (MD5):
        14:34:C8:6F:95:9F:2A:6C:ED:DC:14:78:DE:89:20:A2
    Fingerprint (SHA1):
        C2:19:EC:99:1B:E0:BA:8B:68:A7:0E:B1:69:7D:0D:72:16:D9:CF:10

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4282: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:92
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:09 2012
            Not After : Thu Feb 28 01:46:09 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:e8:1f:76:a0:6d:ad:41:6a:32:7f:9b:bd:f4:34:17:
                    19:ab:c3:35:5a:f3:16:fb:9f:e2:fa:13:f8:38:d3:00:
                    37:9a:d3:c1:8e:99:cf:00:d2:d0:3e:9f:0e:14:82:ce:
                    82:cb:24:13:17:30:9d:9b:f1:d0:a8:5e:c5:08:71:b7:
                    76:a7:56:ad:8c:5a:a1:2b:2e:d2:9f:cd:df:74:ed:30:
                    20:94:eb:18:19:93:6a:6e:df:2e:98:3b:03:0a:73:16:
                    a8:86:17:be:4a:18:56:d9:95:17:09:67:86:85:07:86:
                    a4:be:39:12:a0:25:82:1d:f8:a1:62:7e:11:ee:67:57
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cd:e1:88:41:2e:4d:1f:10:4b:82:68:fd:49:82:26:58:
        db:ce:42:a0:3f:9b:5a:09:e6:ea:a8:c6:6d:75:af:1c:
        3b:b3:f2:90:79:e8:ae:3b:c3:fa:9d:37:83:2a:76:09:
        c4:96:04:aa:f6:c7:d2:a0:87:e6:16:dd:b8:02:75:fa:
        f7:ca:54:75:5d:1d:95:c3:42:fc:25:c0:07:b5:21:04:
        bb:86:47:94:6a:c0:9d:87:1e:fb:f7:a5:b0:04:eb:e3:
        dc:c2:20:79:ce:e2:ce:c8:79:f4:d6:b0:b3:7d:60:56:
        4c:89:c7:2d:33:d7:7e:e3:80:52:c5:6d:b1:07:27:35
    Fingerprint (MD5):
        B7:3D:A0:51:9C:34:7D:CA:08:24:78:63:49:30:1D:03
    Fingerprint (SHA1):
        E5:50:CE:10:EC:AA:8C:14:D3:8F:DE:F6:01:D1:5D:A8:8D:41:10:E2

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4283: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:94
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:09 2012
            Not After : Thu Feb 28 01:46:09 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f1:33:89:e6:37:2d:ba:b5:3e:0b:10:23:8e:b5:e0:81:
                    95:c4:64:18:ae:5a:6d:34:30:62:a0:30:a5:b3:ed:e7:
                    55:1f:75:10:e0:99:ee:49:d8:84:27:59:75:fd:60:30:
                    1c:ac:53:90:f7:d1:c4:9b:6d:9c:73:7c:0b:2a:36:f8:
                    96:ed:86:d8:ff:31:9b:a6:af:99:ea:a4:1e:b2:e1:4a:
                    14:32:76:af:95:96:f2:09:f2:23:7a:7d:e1:45:6c:ab:
                    49:97:bf:80:28:d9:b1:0c:56:6b:a8:a5:4e:ca:ca:81:
                    1d:7e:85:54:40:aa:02:a0:22:18:0e:1c:47:65:d0:39
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4b:ce:96:08:c2:6d:d0:2f:27:d3:f6:a1:dd:02:a8:db:
        21:8e:2d:1a:79:5b:6f:8f:5f:90:f1:7a:31:53:53:fd:
        3c:a6:80:5e:dd:af:75:1b:85:25:6d:46:24:50:ce:e6:
        a3:b0:20:d6:7b:96:26:29:1a:12:cd:d8:eb:b0:44:6c:
        44:1e:14:8a:ab:88:9f:54:0d:0c:11:8e:a3:57:2d:28:
        a0:f7:86:a4:6c:90:e8:05:3d:be:3f:6a:52:86:97:2c:
        ba:32:ab:43:2c:c9:39:37:5f:c7:5e:59:9d:29:37:11:
        cd:97:57:5b:5e:12:ba:23:2e:a5:d6:7e:5d:8a:9c:f8
    Fingerprint (MD5):
        06:84:7E:42:1D:60:06:A8:78:C7:FF:59:F3:D7:73:31
    Fingerprint (SHA1):
        09:DD:0D:25:BA:A7:89:12:F3:A5:53:B4:D4:97:0C:CE:58:CD:67:78

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4284: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:95
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:10 2012
            Not After : Thu Feb 28 01:46:10 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:b7:da:1c:3f:df:40:66:89:aa:1b:83:ee:8e:5c:ed:
                    c5:5c:2f:d6:20:cd:08:bc:39:a9:55:bf:fa:2b:5c:43:
                    51:75:90:54:f9:3b:1a:a7:45:58:de:77:2b:4a:ff:81:
                    6c:67:63:b5:ea:b2:5e:7d:63:91:20:84:a7:89:b2:bf:
                    cb:b8:e2:82:a9:d4:af:51:34:6b:b2:02:16:55:b8:2c:
                    29:d5:3a:10:a5:11:79:bd:02:fc:7a:71:50:3f:29:01:
                    0b:20:16:23:b1:9a:18:5a:31:5e:a7:33:a7:fe:cc:d7:
                    7c:e8:ac:b4:50:9b:a6:2e:f1:de:59:b0:2c:fa:a7:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8b:5a:a2:fa:3f:7f:ee:d4:55:45:e7:b1:64:c9:cf:3c:
        e9:36:01:96:8e:7e:53:3a:37:1d:72:24:43:d1:f8:b3:
        c7:b5:4d:9d:09:1b:72:0a:09:9d:10:c5:e7:c7:23:8c:
        6a:70:b1:cd:af:d2:b4:e7:bd:03:60:39:6d:e2:be:6c:
        25:5b:9d:82:d5:c2:6f:03:59:80:aa:37:21:c4:10:c9:
        fe:aa:a3:00:fa:37:f1:08:00:4a:8c:cb:35:e3:38:f4:
        9c:5c:67:70:8e:75:61:78:d8:2b:6e:6a:30:41:f0:a3:
        3b:42:96:38:c7:96:36:7e:2d:7d:af:32:77:15:e0:8d
    Fingerprint (MD5):
        14:BF:49:92:46:5A:02:B8:88:B4:C2:CA:A1:F6:79:29
    Fingerprint (SHA1):
        09:DB:A7:7E:E8:21:20:70:86:E3:70:86:2B:21:67:40:B0:E9:B5:F1

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4285: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:96
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:10 2012
            Not After : Thu Feb 28 01:46:10 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:ba:c7:31:ac:fc:20:35:8c:73:e2:ce:27:34:c9:c8:
                    38:f4:02:f7:af:19:e9:e1:40:cd:5d:a9:5b:8a:6e:cc:
                    9f:40:08:b2:67:26:fc:23:bb:14:62:6f:e1:0b:b2:e8:
                    53:a0:dc:5a:79:00:24:a6:92:6f:46:16:e8:ff:9d:8e:
                    5b:37:cc:9f:61:47:98:72:83:87:2d:4a:58:99:44:6b:
                    c1:33:84:88:36:42:1d:22:42:13:e7:cc:2c:6b:c7:3d:
                    71:a7:0a:02:9b:68:d9:2c:d1:7d:77:b2:6a:2c:a7:48:
                    ee:aa:05:12:c5:79:59:a7:05:c6:ba:5c:12:be:da:ed
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        17:af:2b:98:03:25:fe:8c:27:62:0a:27:99:e6:f5:fb:
        f0:b9:d3:e7:f7:0b:c2:13:f7:a3:43:1a:10:04:39:85:
        83:2c:8f:b3:21:b2:5c:b2:b9:a0:91:a4:2a:2f:54:21:
        29:96:a0:49:6a:ee:30:e9:00:4f:ef:ff:e6:d2:3b:51:
        35:3c:a1:e4:25:bb:74:bb:55:00:a9:f8:0a:2e:2f:54:
        9d:ad:f0:a4:72:9b:39:49:32:d9:07:d0:3b:f9:72:96:
        bb:0e:d8:9b:ec:75:5b:15:e4:dc:6b:d9:56:27:9e:8b:
        19:51:01:09:54:30:65:65:fe:be:51:a6:00:2b:ec:65
    Fingerprint (MD5):
        17:93:D3:61:D7:C7:CB:B2:F9:5C:DB:2B:19:C4:2D:4C
    Fingerprint (SHA1):
        65:4C:9E:50:CD:46:97:9D:18:88:FF:FA:F0:F1:8C:A0:7B:7D:BB:40

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4286: CRL Distribution Points Extension (7) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:97
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:11 2012
            Not After : Thu Feb 28 01:46:11 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:53:12:21:1f:13:ea:4b:85:eb:7b:c9:f6:66:fe:ee:
                    df:5c:5a:67:96:31:78:13:2f:54:62:1f:79:e9:ce:08:
                    76:6b:9c:f6:71:a7:ae:b3:c8:ed:14:47:f9:f8:0f:2d:
                    0c:ae:6f:90:f3:f3:6b:2d:2b:9d:ca:0c:55:d4:12:66:
                    33:1c:b9:d0:cf:52:37:c2:e3:b3:5c:f6:60:4f:71:27:
                    ab:32:9f:8c:c3:93:0c:26:88:80:5d:32:d5:39:a9:f0:
                    10:39:a9:36:fc:15:ca:e5:16:a1:c2:65:d3:f9:8c:6d:
                    43:c6:80:8c:5a:65:96:7a:f7:17:e6:0d:5d:a8:e2:11
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:c2:bc:eb:14:4e:06:49:b6:5b:e1:ca:7f:70:57:cc:
        4a:9a:ab:69:e8:86:78:e5:32:a8:1d:05:15:d6:06:20:
        f3:81:2d:e1:40:d7:90:85:5b:a8:88:4e:ea:54:56:f7:
        03:3e:1b:44:ae:57:96:6a:ab:c5:43:da:ca:3a:4a:5e:
        31:ed:e4:ce:73:55:a8:a5:6d:24:93:60:9a:b7:1e:53:
        26:31:f1:9f:39:1e:3e:84:f1:16:bb:44:f8:11:81:4d:
        bf:39:0b:d4:42:80:0a:b1:1f:08:4a:13:d5:a6:18:43:
        18:8b:2f:fd:9d:6c:6b:31:ca:68:aa:82:f0:d1:6f:d0
    Fingerprint (MD5):
        D4:24:3C:56:DA:41:DE:1B:9F:44:9A:F1:A0:92:B4:0B
    Fingerprint (SHA1):
        A0:98:F0:1A:09:B1:7B:DF:40:D1:97:CD:74:A3:08:AA:55:6D:08:1C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4287: CRL Distribution Points Extension (8) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:98
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:11 2012
            Not After : Thu Feb 28 01:46:11 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:bd:f4:fd:dd:8d:f3:e3:5f:76:b3:46:61:f8:66:dd:
                    f5:42:a2:fa:1c:75:df:ae:8d:21:3e:30:a6:7a:61:42:
                    70:66:36:9a:46:23:18:4a:73:60:ad:08:6f:aa:0f:a6:
                    ff:84:18:bc:f5:90:91:34:8f:70:31:19:5a:45:22:7d:
                    b8:29:67:43:b7:0b:5b:d3:18:47:ec:ff:c8:92:0c:b2:
                    25:a2:d5:c0:30:8f:f8:f6:35:53:8a:dd:ce:d6:8a:81:
                    d7:24:47:b3:ce:5b:5e:f5:c7:6a:c4:a1:85:a6:53:3b:
                    b9:43:7a:7d:b8:dc:b7:0d:fe:b8:08:16:28:b4:d3:bd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:e5:1e:98:7c:94:f7:af:f5:18:3d:7b:d2:14:1a:c9:
        90:54:9d:29:ea:7a:eb:41:22:ad:1b:76:3e:09:0d:c9:
        00:79:20:52:ae:9e:31:ed:c8:ee:42:e2:4e:3a:c2:c8:
        f1:e7:f7:4a:cc:cb:ea:ce:9f:52:78:5f:fa:fd:5e:99:
        ec:f9:3b:b4:6a:4e:96:f5:ac:57:f4:3f:d9:76:22:5b:
        29:e8:27:a8:aa:b4:10:c9:e4:7d:a1:40:b5:7b:7b:fc:
        25:52:ff:5d:af:90:be:2b:f7:25:b3:b7:62:09:1e:19:
        8a:55:79:c9:b9:15:72:15:6e:cb:49:47:a8:07:44:9c
    Fingerprint (MD5):
        6F:1B:31:8E:FC:B9:00:D2:F5:A5:40:BB:02:DA:01:A1
    Fingerprint (SHA1):
        47:40:B0:2E:9E:65:A8:F0:BC:B3:E8:87:90:2F:E3:D5:98:2D:12:2E

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4288: Certificate Type Extension (9) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:99
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:12 2012
            Not After : Thu Feb 28 01:46:12 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:ae:6c:90:2f:79:ea:a6:be:df:d3:fb:97:17:ac:ac:
                    ff:10:4d:68:51:34:2f:63:95:f7:64:2a:ae:e2:70:3b:
                    06:74:4b:96:0f:8f:71:ce:c9:c3:66:57:a5:38:7c:c9:
                    77:1d:4b:bd:27:1a:e0:2e:5b:d8:47:52:33:20:9e:17:
                    bb:b7:ae:26:8d:22:55:86:88:53:a6:54:9f:a1:81:74:
                    09:62:de:14:05:36:c4:a9:49:6a:b3:5a:66:53:9b:cc:
                    9f:5e:5e:a0:a9:fd:81:01:0f:76:d6:e3:51:6a:a9:3f:
                    db:dd:ed:08:f8:b8:93:cd:89:a9:8c:0d:21:fb:48:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        af:f0:e7:a7:4e:3f:a5:5a:d0:08:82:08:fe:d8:9d:b4:
        66:7f:be:0d:49:4a:4e:bb:ef:94:aa:f3:38:25:73:33:
        24:18:fc:59:96:7f:a1:6d:3e:f3:2e:f9:5f:6e:7c:07:
        71:0e:f3:0e:e9:d5:9f:64:f9:73:4c:0b:e0:43:09:e4:
        c8:86:16:7a:f7:a0:82:9d:6f:55:78:ea:36:29:a4:8b:
        d7:3b:a3:b9:aa:b1:83:59:e7:cb:bb:a1:0d:e2:d1:ed:
        46:51:4d:1f:8f:ff:25:3f:27:09:d9:60:7d:ea:96:f1:
        e7:7c:4c:12:63:dc:80:2d:44:12:bc:f4:e4:2a:e2:a5
    Fingerprint (MD5):
        82:1D:5D:AA:BC:22:10:2C:55:A7:A2:C1:51:61:60:A2
    Fingerprint (SHA1):
        E9:95:64:6D:A2:81:07:8E:50:16:F0:7B:EC:00:81:BA:7F:82:66:37

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4289: Extended Key Usage Extension (10) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:8a:9a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 01:46:13 2012
            Not After : Thu Feb 28 01:46:13 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:6b:5d:f3:9e:a8:0c:a2:17:ce:ce:d1:39:01:d8:4c:
                    33:d6:56:3a:ce:f0:d7:d8:d7:0c:b7:0d:c5:fe:6b:6d:
                    b4:40:3f:ab:d3:71:86:f1:3c:15:60:c3:41:2f:f2:05:
                    79:4d:5f:78:41:00:a2:86:59:b5:15:15:4f:17:4e:33:
                    4c:94:0e:bd:71:fe:69:23:81:3d:d5:be:1f:8a:a4:fe:
                    b6:aa:0b:2b:21:c0:05:73:fd:68:06:b5:1a:f4:07:68:
                    cf:a8:3f:ea:52:b5:05:fb:7d:9a:1e:a4:13:b2:b7:3b:
                    41:51:96:b8:98:35:e3:96:46:ea:77:9b:d3:30:b4:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:de:21:cf:26:20:d0:6f:5f:38:0d:85:78:18:2e:73:
        cd:22:6a:71:5b:ac:cf:de:4e:e1:26:3a:81:b3:81:b2:
        b2:69:bb:ee:8e:a8:36:38:1a:56:73:fe:9d:c5:82:b2:
        da:f6:79:88:ed:c7:51:f7:3a:b0:c4:cb:68:eb:bb:60:
        c9:88:c3:ba:ef:30:03:f0:2a:80:1b:2b:bc:1d:7c:0a:
        6a:34:ac:bf:59:1b:a1:69:b1:59:1b:41:cc:c7:de:aa:
        04:28:4e:06:31:cc:55:fe:44:b7:f6:8a:11:d5:1c:d3:
        14:2b:e4:6a:14:8c:d2:27:80:ce:fa:a7:af:3c:23:6b
    Fingerprint (MD5):
        9C:4F:FA:E8:AC:E5:0C:81:0E:E6:A0:18:21:2F:01:CB
    Fingerprint (SHA1):
        A5:DD:EF:B5:37:A2:97:E8:30:DB:51:06:73:46:35:C8:CC:20:4D:E3

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4290: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass -f ../tests.pw
cert.sh: #4291: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4292: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4293: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass -o root.cert
cert.sh: #4294: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #4295: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #4296: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #4297: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
cert.sh: #4298: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4299: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -i ../CA/TestCA.ca.cert
cert.sh: #4300: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #4301: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4302: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #4303: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #4304: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4305: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #4306: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #4307: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4308: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #4309: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #4310: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
cert.sh: #4311: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4312: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -o root.cert
cert.sh: #4313: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #4314: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4315: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA/req and ./req are identical (not copied).
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #4316: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #4317: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4318: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4319: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4320: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4321: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4322: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4323: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4324: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4325: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4326: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4327: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4328: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4329: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #4330: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4331: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #4332: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser40.cert
cert.sh: #4333: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4334: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #4335: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #4336: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4337: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #4338: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #4339: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4340: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #4341: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser41.cert
cert.sh: #4342: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4343: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #4344: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #4345: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4346: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #4347: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #4348: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4349: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #4350: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser42.cert
cert.sh: #4351: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4352: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #4353: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #4354: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4355: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #4356: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #4357: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4358: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #4359: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser43.cert
cert.sh: #4360: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4361: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #4362: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #4363: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4364: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #4365: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #4366: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4367: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #4368: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser44.cert
cert.sh: #4369: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4370: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #4371: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #4372: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4373: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #4374: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #4375: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4376: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #4377: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser45.cert
cert.sh: #4378: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4379: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #4380: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #4381: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4382: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #4383: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #4384: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4385: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #4386: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser46.cert
cert.sh: #4387: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4388: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #4389: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #4390: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4391: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #4392: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #4393: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4394: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #4395: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser47.cert
cert.sh: #4396: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4397: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #4398: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #4399: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4400: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #4401: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #4402: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4403: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #4404: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser48.cert
cert.sh: #4405: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4406: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #4407: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #4408: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4409: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #4410: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #4411: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4412: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #4413: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser49.cert
cert.sh: #4414: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4415: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #4416: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #4417: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4418: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #4419: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #4420: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4421: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #4422: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser50.cert
cert.sh: #4423: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4424: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #4425: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #4426: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4427: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #4428: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #4429: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4430: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #4431: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser51.cert
cert.sh: #4432: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4433: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #4434: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #4435: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4436: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #4437: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #4438: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4439: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #4440: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser52.cert
cert.sh: #4441: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4442: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #4443: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #4444: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4445: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #4446: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #4447: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #4448: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #4449: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #4450: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #4451: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #4452: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #4453: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #4454: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #4455: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #4456: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #4457: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #4458: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #4459: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #4460: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #4461: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 17:46:44 PST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 17:46:44 PST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4462: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c7:2d:f5:ed:6a:70:a4:26:64:6c:7e:a6:84:c6:58:0f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4463: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4464: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4465: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4466: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                48:a9:b8:90:0a:19:d1:e7:5f:29:36:56:c1:89:71:75
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 01:45:17 2012
            Not After : Tue Nov 28 01:45:17 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:ba:a2:62:54:c7:6a:92:16:15:f4:09:0a:2c:8f:
                    3d:1c:92:8b:ad:a0:d3:49:f5:a6:01:c4:d7:2f:62:21:
                    df:f3:8a:94:eb:32:28:f0:02:be:a3:0d:1b:d8:bb:71:
                    92:65:30:4b:90:df:d2:11:b9:28:8d:86:f4:1c:47:33:
                    7c:55:60:00:0a:86:4a:03:76:2c:57:65:49:d7:99:e9:
                    ac:55:b1:5c:bd:3d:af:7d:6f:bb:af:88:b5:a0:92:c1:
                    42:99:dc:47:b6:9b:10:2b:48:fb:ae:ea:9f:0c:8a:2f:
                    20:e0:e7:03:72:e6:89:79:73:ae:80:f2:b8:3c:66:6a:
                    c0:fa:8b:d5:00
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:41:0c:c2:f1:12:a2:fc:39:57:4f:e6:3f:
        cf:83:43:d4:6c:5b:bf:8e:5c:74:51:41:1e:3f:ec:0b:
        a6:9e:67:52:2c:f1:ef:3b:df:92:2b:a9:c4:18:87:44:
        9a:ac:97:a1:f9:db:54:94:df:7a:62:6f:1a:e4:18:19:
        c0:65:96:ed:41:e6:02:42:01:67:60:01:3b:e0:af:4f:
        ee:7b:55:16:66:b0:5d:d3:52:4a:ef:0b:08:3b:26:3a:
        67:97:29:6c:d1:cc:d2:b8:a3:1a:40:14:e3:2a:fc:bd:
        d8:ac:47:8e:2f:3e:59:d7:e9:25:cb:06:dc:51:07:0d:
        bd:18:72:6e:77:d5:33:82:58:f5
    Fingerprint (MD5):
        0A:9E:09:97:44:82:01:A7:B0:F3:5B:07:B1:D2:BE:96
    Fingerprint (SHA1):
        5A:A4:C3:08:D4:FA:DA:B7:FB:D6:86:87:05:BD:76:0F:65:14:5E:6B

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:8a:ef:8f:6b:2e:78:7b:71:bf:da:e6:6a:60:e8:39:
                    57:69:eb:e1:27:7f:c1:e3:3f:d4:e3:8c:73:0a:7d:a9:
                    d1:d3:ad:86:14:03:e0:97:ae:b6:46:c6:ab:dd:77:00:
                    59:59:73:3f:68:52:b3:2c:d6:cc:d9:88:77:05:8b:6c:
                    77:6d:87:76:c4:5e:57:e2:4b:32:63:45:2c:ac:2c:90:
                    c2:09:10:0d:58:be:e2:39:44:2b:db:dc:bf:55:4d:c1:
                    5e
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:27:db:a8:e8:f8:bd:99:a5:ac:1c:
        7a:55:03:da:4b:d9:3f:44:6d:94:b7:04:1a:6f:89:59:
        e4:03:90:f5:43:51:2b:a4:6b:1d:f1:7d:42:2c:95:94:
        b5:41:10:fe:92:8a:28:75:dc:13:0c:66:30:f4:08:13:
        0d:a6:cc:a6:62:e9:5a:02:42:01:11:c1:65:01:7d:54:
        88:78:bc:0c:ce:c5:26:38:50:75:9c:a8:e8:d3:80:93:
        0a:2b:a0:40:88:dd:10:bb:8a:6b:ef:ec:db:a1:ed:11:
        26:a5:a0:ea:cf:cf:c3:f8:25:e2:c6:ed:40:f5:a7:75:
        d1:d4:ce:a1:d8:11:95:a1:6f:76:c4
    Fingerprint (MD5):
        19:75:B5:27:89:6D:6E:E1:00:8C:42:FF:7B:50:02:5E
    Fingerprint (SHA1):
        3B:B3:D4:76:E4:09:E1:B5:26:AD:5E:D3:1A:F3:02:91:76:16:C5:94

    Friendly Name: Alice-ec

tools.sh: #4467: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4468: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                d6:76:89:73:cd:8b:7a:4c:75:8f:28:54:f3:87:be:47
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4469: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4470: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4471: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                9e:bf:b5:b8:8b:08:dc:9c:f5:4b:5c:29:bb:bb:57:73
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4472: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4473: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4474: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                02:4b:c7:40:df:cd:7e:ba:fd:02:77:68:94:d0:af:3d
            Iteration Count: 2000 (0x7d0)
tools.sh: #4475: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4476: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4477: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                49:a1:cd:1c:b6:7e:d8:58:ab:e6:7e:b5:04:3f:b5:44
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4478: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4479: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4480: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                df:16:ce:43:cb:94:ec:b6:d9:84:d4:1a:7e:9a:5a:48
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4481: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4482: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4483: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                6c:28:4a:d5:fb:fd:96:e7:20:ff:03:8e:a5:69:6d:e2
            Iteration Count: 2000 (0x7d0)
tools.sh: #4484: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4485: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4486: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6e:06:fd:fa:c0:fc:28:62:3a:f8:1b:9d:1f:c3:85:f1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:e6:5b:e3:83:77:fb:a9:31:1c:c1:47:9d:fa:b8:
                    11:42
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4487: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4488: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4489: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b1:52:96:59:ab:d9:aa:09:fd:42:24:40:f5:5f:70:31
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:97:65:53:35:a9:68:0f:c9:90:98:b4:a7:c5:98:
                    9e:9e
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4490: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4491: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4492: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5d:50:36:1c:e8:ba:41:11:a7:20:b3:96:54:e6:71:fd
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:b5:67:a1:85:86:40:c8:2c:cf:a0:8d:24:e4:1e:
                    36:81
tools.sh: #4493: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4494: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4495: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        00:4a:2a:6c:a2:37:df:5b:85:50:0c:14:f5:e9:97:34
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:cf:fc:08:bf:2c:72:03:58:94:73:66:62:b7:76:
                    6b:de
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4496: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4497: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4498: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        56:29:b8:38:cb:fa:68:6d:de:8e:15:d4:c2:9a:fe:db
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:e9:dc:ca:47:dd:cf:32:a3:a1:63:b8:e8:f5:1e:
                    13:0f
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4499: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4500: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4501: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        42:2d:1d:84:88:26:5f:d7:b3:46:ef:46:e4:f9:9e:db
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:84:b2:81:d1:a0:e6:a3:68:91:13:62:dc:96:a9:
                    11:11
tools.sh: #4502: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4503: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4504: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        03:cc:2b:5f:c1:f9:fe:41:f9:e7:a3:4b:ed:60:39:1d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:12:7e:be:ff:f7:23:32:9a:88:44:af:4a:43:04:
                    53:58
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4505: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4506: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4507: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        4c:66:72:eb:6e:8c:7a:5a:ce:52:89:d4:7b:b0:93:4f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:8f:5e:f1:eb:10:eb:df:9f:c7:cd:07:4b:f0:23:
                    8e:9b
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4508: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4509: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4510: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        31:f4:e7:c0:d8:b5:39:23:33:bc:7f:6c:17:74:26:75
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:97:18:f2:d2:f0:45:9a:be:48:38:60:1f:20:69:
                    82:19
tools.sh: #4511: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4512: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4513: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        9b:48:8c:db:b5:d6:83:26:a7:cc:9c:a7:47:ab:16:9e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:98:23:55:14:27:78:02:6a:09:d8:2f:84:e3:35:
                    39:54
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4514: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4515: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4516: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        db:0d:29:90:69:a4:dc:ff:5b:49:83:39:e8:8a:3f:4a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:3c:60:f5:7e:64:8d:28:7e:fc:e6:a7:36:ec:c3:
                    45:db
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4517: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4518: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4519: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3b:91:91:7e:a6:25:ac:6f:91:be:98:8c:6f:ef:42:ad
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:df:10:da:8f:8f:12:c3:52:9c:6c:09:2a:09:d6:
                    44:9c
tools.sh: #4520: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4521: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4522: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        31:7c:11:d4:69:32:f0:c5:48:35:95:26:8b:2f:17:f4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:10:c2:3e:78:61:e2:dd:a8:1c:1e:80:dd:20:c8:
                    4f:ff
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4523: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4524: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4525: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f1:c5:29:48:bb:5e:9b:9f:52:7d:b7:17:c7:3a:a1:7a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:be:89:46:9e:49:22:45:21:24:c0:f2:94:83:34:
                    59:0f
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4526: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4527: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4528: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        19:a3:46:3b:eb:be:1c:b4:92:d1:44:4c:23:65:8c:2e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:a5:6f:c9:ff:96:bc:d3:5d:7b:a7:88:e0:86:5c:
                    f4:8d
tools.sh: #4529: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4530: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4531: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        fb:96:73:1f:6b:fe:b2:4e:e4:35:55:63:2c:0a:0e:bf
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:ae:32:ee:a7:60:c7:6e:21:37:97:a9:24:4f:de:
                    b7:8d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4532: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4533: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4534: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5a:08:4b:7d:4c:87:40:6c:79:3a:97:43:d4:81:41:a0
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:90:f1:78:58:5c:69:d2:db:54:72:f0:67:30:20:
                    0f:22
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4535: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4536: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4537: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ed:a2:15:c9:73:ae:3a:9b:0b:55:d1:12:19:c2:8d:c1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:65:f4:f9:a6:f6:9b:5f:14:83:aa:6c:94:3c:b3:
                    86:ba
tools.sh: #4538: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4539: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4540: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                34:da:8e:a3:ef:d9:fd:9d:f7:63:59:00:b2:3e:44:22
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4541: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4542: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4543: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                00:77:b3:e2:60:e2:1b:fa:d8:42:18:cd:6f:b4:86:8a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4544: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4545: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4546: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                aa:7a:85:de:ba:18:e4:a6:63:2d:ee:76:27:6e:e6:2f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4547: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4548: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4549: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                02:c2:0d:22:08:45:c0:b0:4e:93:52:61:30:95:72:aa
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4550: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4551: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4552: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                0d:3e:b9:2b:12:1e:ad:22:dd:08:a8:dc:7b:20:75:b5
            Iteration Count: 2000 (0x7d0)
tools.sh: #4553: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4554: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4555: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ee:97:d1:72:8e:2b:b4:3f:ee:9e:2a:bf:fb:be:0c:df
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4556: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4557: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4558: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                1f:37:df:ce:0d:9b:1e:78:75:7e:fd:f9:a5:c6:b1:43
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4559: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4560: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4561: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                d0:7c:0c:48:fa:83:05:f0:40:99:c7:d5:4e:20:35:e6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4562: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4563: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4564: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                44:5a:b3:b4:71:db:e2:99:06:4a:c6:a3:08:8d:42:69
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4565: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4566: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4567: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                dd:13:17:e9:4b:7d:0c:26:88:f2:02:ed:38:72:01:a1
            Iteration Count: 2000 (0x7d0)
tools.sh: #4568: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4569: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4570: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                6a:90:3f:8d:bb:ca:59:42:bf:65:43:8d:fd:bb:15:44
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4571: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4572: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4573: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                95:fc:db:f0:40:e5:77:85:65:a4:11:9e:25:d3:47:83
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4574: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4575: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4576: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                65:94:cc:cf:63:0e:fa:46:e2:be:15:0d:9c:74:ef:36
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4577: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4578: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4579: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                f7:a6:86:8a:21:55:78:dc:e8:a9:42:19:d9:ee:af:d4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4580: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4581: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4582: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                2f:24:d2:4b:36:45:e9:21:d5:06:ed:21:d9:82:d1:88
            Iteration Count: 2000 (0x7d0)
tools.sh: #4583: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4584: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4585: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                7d:52:da:ce:04:38:fa:43:93:86:5b:fa:dc:87:06:60
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4586: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4587: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4588: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0d:8a:36:49:b2:47:33:1f:e6:74:33:db:9c:d3:3e:2f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4589: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4590: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4591: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                cc:bf:05:26:c4:fb:b0:f2:19:ee:34:8b:7f:66:44:4d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4592: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4593: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4594: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                dc:35:50:55:b8:fc:5d:5b:1b:5e:04:84:90:35:38:1f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4595: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4596: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4597: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                98:90:e6:4d:d8:a2:87:f3:4b:20:40:68:41:5c:37:81
            Iteration Count: 2000 (0x7d0)
tools.sh: #4598: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4599: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4600: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8c:15:a2:d2:d4:ac:c5:9c:e7:63:14:97:e4:af:79:bf
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4601: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4602: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4603: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                88:7d:84:89:04:a2:d3:20:a5:99:7a:72:0c:e9:6f:d0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4604: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4605: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4606: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c7:b6:44:23:3e:db:ea:92:72:5a:f9:89:7a:8b:a5:fe
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4607: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4608: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4609: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                27:33:27:44:0f:d3:ed:34:9d:89:09:82:c9:c7:4b:7b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4610: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4611: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4612: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0f:92:c9:a3:30:aa:19:a6:87:07:66:8b:9d:b1:09:96
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4613: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4614: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4615: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                31:a1:67:c8:9e:fc:ec:96:b1:4a:1f:db:e8:de:0a:c7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4616: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4617: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4618: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                87:79:7a:61:0f:30:71:b5:e2:ca:fc:18:51:4a:23:2f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4619: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4620: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4621: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                19:a6:3f:97:70:69:1f:f4:21:11:63:29:fb:12:15:b3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4622: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4623: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4624: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                00:f6:aa:0e:36:b0:07:e0:76:2a:64:49:d2:8f:a0:34
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4625: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4626: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4627: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                02:09:7c:6a:58:62:d3:e7:d2:4a:ab:59:51:62:92:f6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:14 2012
            Not After : Tue Nov 28 01:45:14 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:37:8a:01:eb:fb:72:7e:79:32:f7:e0:a0:97:23:cc:
                    c6:53:f8:03:45:e9:76:00:00:9b:17:f1:cb:a1:e5:9e:
                    14:a2:33:4f:a3:03:35:72:ce:b2:b7:98:cd:63:83:6f:
                    e2:35:2d:50:ce:4a:f1:22:5d:fa:97:56:6a:da:a8:19:
                    e0:86:1f:f8:55:83:ab:46:08:7a:e0:98:09:ea:1f:47:
                    f6:f8:b1:d4:7e:e4:12:b7:3e:0f:f3:7f:39:99:1a:fc:
                    41:72:45:8a:aa:6e:46:de:df:56:f6:f9:fc:04:fc:e7:
                    8d:68:4d:6d:a7:4f:40:8b:2d:d6:7e:fb:38:1e:5c:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:77:31:d8:0d:7d:fc:b3:a3:1b:a3:bc:35:36:05:21:
        7a:fc:9e:46:59:ff:4a:b4:00:d3:e9:e3:46:a5:50:2f:
        5d:b0:83:a4:ef:48:be:03:55:f0:e2:6f:9f:7a:f7:b2:
        75:2e:72:c7:c2:63:6c:d5:44:b4:30:ab:b1:e4:66:57:
        49:ee:2e:fa:a3:cd:a6:31:9b:f2:19:e3:56:18:c8:10:
        0c:bf:8a:6f:dc:02:ba:19:0a:fb:ef:81:3f:fc:de:88:
        57:18:93:1b:33:63:81:34:50:1e:60:7d:fa:17:84:84:
        64:77:36:a5:22:85:d2:07:8a:c2:5a:bf:43:28:6b:8c
    Fingerprint (MD5):
        27:7C:1E:DE:67:0B:93:D2:AB:96:27:9B:4D:B2:FA:46
    Fingerprint (SHA1):
        01:2E:64:FF:5D:5E:36:EA:CC:0B:F9:37:C4:CE:72:E2:01:CB:CB:39

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:45:29 2012
            Not After : Tue Nov 28 01:45:29 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:4a:74:e5:16:65:83:6a:7d:56:f0:2e:35:6f:ab:50:
                    e0:45:65:bb:55:93:cf:1c:dd:5e:c4:00:08:88:76:ba:
                    2d:53:8d:25:10:d0:14:00:c5:20:db:3e:56:41:f9:b6:
                    e7:f4:5b:6f:d0:89:fd:19:ae:6e:7d:27:99:ad:d6:1c:
                    e5:25:32:0a:15:1a:d9:a7:9d:9f:07:03:59:33:36:54:
                    de:1a:2e:b6:b2:ee:cb:39:63:22:8d:4b:56:19:9d:4d:
                    dd:d9:29:b8:a8:42:8e:16:4c:6a:bd:16:7a:37:bd:1c:
                    fc:38:a2:54:82:8b:6e:f9:50:a5:38:6e:be:6e:53:9f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2c:36:d0:7e:8a:52:d9:b3:1b:ae:95:2d:91:57:39:
        d7:12:9f:81:9c:4a:f7:79:af:c5:06:33:a0:ad:60:33:
        93:59:5f:4d:6c:c8:78:f1:a4:c1:37:c3:21:ba:ff:32:
        77:25:52:b8:98:3f:43:71:29:69:ce:bc:33:82:2c:f5:
        9b:66:e9:95:ca:5b:7f:92:42:46:27:e3:a2:6e:a4:54:
        ce:44:b2:24:52:e7:33:ed:3e:ba:2c:8b:f9:a5:ed:75:
        d5:bc:35:36:80:54:2e:9e:8d:86:30:55:23:d4:4a:31:
        41:03:01:53:ef:d8:ae:15:37:d3:5f:92:cd:30:53:04
    Fingerprint (MD5):
        01:B9:BB:C3:CE:A3:66:9A:3E:5B:17:85:B2:3B:5C:80
    Fingerprint (SHA1):
        87:6A:A6:45:13:11:5F:9F:29:03:ED:30:1B:AF:FC:40:7D:7D:F8:7E

    Friendly Name: Alice

tools.sh: #4628: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4629: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #4630: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4631: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #4632: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #4633: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #4634: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4635: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #4636: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #4637: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4638: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 17:47:01 PST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 17:47:01 PST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #4639: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #4640: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      7d2a8f62ea7360e020d1ab5903ebcd6e2b22180b   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #4641: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #4642: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #4643: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #4644: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #4645: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #4646: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #4647: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #4648: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #4649: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4650: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #4651: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      7d2a8f62ea7360e020d1ab5903ebcd6e2b22180b   FIPS_PUB_140_Test_Certificate
fips.sh: #4652: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #4653: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #4654: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4655: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #4656: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      7d2a8f62ea7360e020d1ab5903ebcd6e2b22180b   FIPS_PUB_140_Test_Certificate
fips.sh: #4657: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #4658: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #4659: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcrmf.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libjar.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckfw.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle/libsoftokn3.dylib
mangle -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle/libsoftokn3.dylib -o -8 -b 5
Changing byte 0x00048078 (295032): from 65 (101) to 45 (69)
DYLD_LIBRARY_PATH=/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/fips/mangle dbtest -r -d ../fips
fips.sh: #4660: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 17:47:19 PST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 17:47:19 PST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91099 >/dev/null 2>/dev/null
selfserv with PID 91099 found at Tue Nov 27 17:47:20 PST 2012
selfserv with PID 91099 started at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4661: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91099 at Tue Nov 27 17:47:20 PST 2012
kill -USR1 91099
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91099 killed at Tue Nov 27 17:47:20 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91146 >/dev/null 2>/dev/null
selfserv with PID 91146 found at Tue Nov 27 17:47:20 PST 2012
selfserv with PID 91146 started at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4662: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91146 at Tue Nov 27 17:47:20 PST 2012
kill -USR1 91146
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91146 killed at Tue Nov 27 17:47:20 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91193 >/dev/null 2>/dev/null
selfserv with PID 91193 found at Tue Nov 27 17:47:20 PST 2012
selfserv with PID 91193 started at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4663: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91193 at Tue Nov 27 17:47:20 PST 2012
kill -USR1 91193
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91193 killed at Tue Nov 27 17:47:20 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91252 >/dev/null 2>/dev/null
selfserv with PID 91252 found at Tue Nov 27 17:47:20 PST 2012
selfserv with PID 91252 started at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4664: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91252 at Tue Nov 27 17:47:20 PST 2012
kill -USR1 91252
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91252 killed at Tue Nov 27 17:47:20 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91299 >/dev/null 2>/dev/null
selfserv with PID 91299 found at Tue Nov 27 17:47:21 PST 2012
selfserv with PID 91299 started at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4665: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91299 at Tue Nov 27 17:47:21 PST 2012
kill -USR1 91299
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91299 killed at Tue Nov 27 17:47:21 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91346 >/dev/null 2>/dev/null
selfserv with PID 91346 found at Tue Nov 27 17:47:21 PST 2012
selfserv with PID 91346 started at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4666: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91346 at Tue Nov 27 17:47:21 PST 2012
kill -USR1 91346
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91346 killed at Tue Nov 27 17:47:21 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91405 >/dev/null 2>/dev/null
selfserv with PID 91405 found at Tue Nov 27 17:47:21 PST 2012
selfserv with PID 91405 started at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4667: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91405 at Tue Nov 27 17:47:21 PST 2012
kill -USR1 91405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91405 killed at Tue Nov 27 17:47:21 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91452 >/dev/null 2>/dev/null
selfserv with PID 91452 found at Tue Nov 27 17:47:21 PST 2012
selfserv with PID 91452 started at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4668: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91452 at Tue Nov 27 17:47:21 PST 2012
kill -USR1 91452
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91452 killed at Tue Nov 27 17:47:21 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91499 >/dev/null 2>/dev/null
selfserv with PID 91499 found at Tue Nov 27 17:47:22 PST 2012
selfserv with PID 91499 started at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4669: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91499 at Tue Nov 27 17:47:22 PST 2012
kill -USR1 91499
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91499 killed at Tue Nov 27 17:47:22 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91558 >/dev/null 2>/dev/null
selfserv with PID 91558 found at Tue Nov 27 17:47:22 PST 2012
selfserv with PID 91558 started at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4670: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91558 at Tue Nov 27 17:47:22 PST 2012
kill -USR1 91558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91558 killed at Tue Nov 27 17:47:22 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91605 >/dev/null 2>/dev/null
selfserv with PID 91605 found at Tue Nov 27 17:47:22 PST 2012
selfserv with PID 91605 started at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4671: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91605 at Tue Nov 27 17:47:22 PST 2012
kill -USR1 91605
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91605 killed at Tue Nov 27 17:47:22 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91652 >/dev/null 2>/dev/null
selfserv with PID 91652 found at Tue Nov 27 17:47:22 PST 2012
selfserv with PID 91652 started at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4672: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91652 at Tue Nov 27 17:47:22 PST 2012
kill -USR1 91652
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91652 killed at Tue Nov 27 17:47:22 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91711 >/dev/null 2>/dev/null
selfserv with PID 91711 found at Tue Nov 27 17:47:22 PST 2012
selfserv with PID 91711 started at Tue Nov 27 17:47:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4673: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91711 at Tue Nov 27 17:47:23 PST 2012
kill -USR1 91711
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91711 killed at Tue Nov 27 17:47:23 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91758 >/dev/null 2>/dev/null
selfserv with PID 91758 found at Tue Nov 27 17:47:23 PST 2012
selfserv with PID 91758 started at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4674: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91758 at Tue Nov 27 17:47:23 PST 2012
kill -USR1 91758
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91758 killed at Tue Nov 27 17:47:23 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91805 >/dev/null 2>/dev/null
selfserv with PID 91805 found at Tue Nov 27 17:47:23 PST 2012
selfserv with PID 91805 started at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4675: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91805 at Tue Nov 27 17:47:23 PST 2012
kill -USR1 91805
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91805 killed at Tue Nov 27 17:47:23 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91864 >/dev/null 2>/dev/null
selfserv with PID 91864 found at Tue Nov 27 17:47:23 PST 2012
selfserv with PID 91864 started at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4676: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91864 at Tue Nov 27 17:47:23 PST 2012
kill -USR1 91864
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91864 killed at Tue Nov 27 17:47:23 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91911 >/dev/null 2>/dev/null
selfserv with PID 91911 found at Tue Nov 27 17:47:23 PST 2012
selfserv with PID 91911 started at Tue Nov 27 17:47:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4677: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 91911 at Tue Nov 27 17:47:24 PST 2012
kill -USR1 91911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91911 killed at Tue Nov 27 17:47:24 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 91958 >/dev/null 2>/dev/null
selfserv with PID 91958 found at Tue Nov 27 17:47:24 PST 2012
selfserv with PID 91958 started at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4678: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 91958 at Tue Nov 27 17:47:24 PST 2012
kill -USR1 91958
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 91958 killed at Tue Nov 27 17:47:24 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92017 >/dev/null 2>/dev/null
selfserv with PID 92017 found at Tue Nov 27 17:47:24 PST 2012
selfserv with PID 92017 started at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4679: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92017 at Tue Nov 27 17:47:24 PST 2012
kill -USR1 92017
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92017 killed at Tue Nov 27 17:47:24 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92064 >/dev/null 2>/dev/null
selfserv with PID 92064 found at Tue Nov 27 17:47:24 PST 2012
selfserv with PID 92064 started at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4680: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92064 at Tue Nov 27 17:47:24 PST 2012
kill -USR1 92064
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92064 killed at Tue Nov 27 17:47:24 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92111 >/dev/null 2>/dev/null
selfserv with PID 92111 found at Tue Nov 27 17:47:24 PST 2012
selfserv with PID 92111 started at Tue Nov 27 17:47:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4681: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92111 at Tue Nov 27 17:47:24 PST 2012
kill -USR1 92111
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92111 killed at Tue Nov 27 17:47:24 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92170 >/dev/null 2>/dev/null
selfserv with PID 92170 found at Tue Nov 27 17:47:25 PST 2012
selfserv with PID 92170 started at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4682: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92170 at Tue Nov 27 17:47:25 PST 2012
kill -USR1 92170
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92170 killed at Tue Nov 27 17:47:25 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92217 >/dev/null 2>/dev/null
selfserv with PID 92217 found at Tue Nov 27 17:47:25 PST 2012
selfserv with PID 92217 started at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4683: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92217 at Tue Nov 27 17:47:25 PST 2012
kill -USR1 92217
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92217 killed at Tue Nov 27 17:47:25 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92264 >/dev/null 2>/dev/null
selfserv with PID 92264 found at Tue Nov 27 17:47:25 PST 2012
selfserv with PID 92264 started at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4684: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92264 at Tue Nov 27 17:47:25 PST 2012
kill -USR1 92264
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92264 killed at Tue Nov 27 17:47:25 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92323 >/dev/null 2>/dev/null
selfserv with PID 92323 found at Tue Nov 27 17:47:25 PST 2012
selfserv with PID 92323 started at Tue Nov 27 17:47:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4685: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92323 at Tue Nov 27 17:47:25 PST 2012
kill -USR1 92323
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92323 killed at Tue Nov 27 17:47:25 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92370 >/dev/null 2>/dev/null
selfserv with PID 92370 found at Tue Nov 27 17:47:26 PST 2012
selfserv with PID 92370 started at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4686: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92370 at Tue Nov 27 17:47:26 PST 2012
kill -USR1 92370
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92370 killed at Tue Nov 27 17:47:26 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92417 >/dev/null 2>/dev/null
selfserv with PID 92417 found at Tue Nov 27 17:47:26 PST 2012
selfserv with PID 92417 started at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4687: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92417 at Tue Nov 27 17:47:26 PST 2012
kill -USR1 92417
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92417 killed at Tue Nov 27 17:47:26 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92476 >/dev/null 2>/dev/null
selfserv with PID 92476 found at Tue Nov 27 17:47:26 PST 2012
selfserv with PID 92476 started at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4688: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92476 at Tue Nov 27 17:47:26 PST 2012
kill -USR1 92476
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92476 killed at Tue Nov 27 17:47:26 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92523 >/dev/null 2>/dev/null
selfserv with PID 92523 found at Tue Nov 27 17:47:26 PST 2012
selfserv with PID 92523 started at Tue Nov 27 17:47:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4689: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92523 at Tue Nov 27 17:47:26 PST 2012
kill -USR1 92523
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92523 killed at Tue Nov 27 17:47:26 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92570 >/dev/null 2>/dev/null
selfserv with PID 92570 found at Tue Nov 27 17:47:27 PST 2012
selfserv with PID 92570 started at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4690: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92570 at Tue Nov 27 17:47:27 PST 2012
kill -USR1 92570
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92570 killed at Tue Nov 27 17:47:27 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92629 >/dev/null 2>/dev/null
selfserv with PID 92629 found at Tue Nov 27 17:47:27 PST 2012
selfserv with PID 92629 started at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4691: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92629 at Tue Nov 27 17:47:27 PST 2012
kill -USR1 92629
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92629 killed at Tue Nov 27 17:47:27 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92676 >/dev/null 2>/dev/null
selfserv with PID 92676 found at Tue Nov 27 17:47:27 PST 2012
selfserv with PID 92676 started at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4692: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92676 at Tue Nov 27 17:47:27 PST 2012
kill -USR1 92676
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92676 killed at Tue Nov 27 17:47:27 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:47:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92723 >/dev/null 2>/dev/null
selfserv with PID 92723 found at Tue Nov 27 17:47:27 PST 2012
selfserv with PID 92723 started at Tue Nov 27 17:47:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4693: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92723 at Tue Nov 27 17:47:27 PST 2012
kill -USR1 92723
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92723 killed at Tue Nov 27 17:47:27 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92782 >/dev/null 2>/dev/null
selfserv with PID 92782 found at Tue Nov 27 17:47:28 PST 2012
selfserv with PID 92782 started at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4694: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92782 at Tue Nov 27 17:47:28 PST 2012
kill -USR1 92782
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92782 killed at Tue Nov 27 17:47:28 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92829 >/dev/null 2>/dev/null
selfserv with PID 92829 found at Tue Nov 27 17:47:28 PST 2012
selfserv with PID 92829 started at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4695: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92829 at Tue Nov 27 17:47:28 PST 2012
kill -USR1 92829
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92829 killed at Tue Nov 27 17:47:28 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:47:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92876 >/dev/null 2>/dev/null
selfserv with PID 92876 found at Tue Nov 27 17:47:28 PST 2012
selfserv with PID 92876 started at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4696: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 92876 at Tue Nov 27 17:47:28 PST 2012
kill -USR1 92876
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92876 killed at Tue Nov 27 17:47:28 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92935 >/dev/null 2>/dev/null
selfserv with PID 92935 found at Tue Nov 27 17:47:28 PST 2012
selfserv with PID 92935 started at Tue Nov 27 17:47:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4697: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92935 at Tue Nov 27 17:47:28 PST 2012
kill -USR1 92935
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92935 killed at Tue Nov 27 17:47:28 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 92982 >/dev/null 2>/dev/null
selfserv with PID 92982 found at Tue Nov 27 17:47:29 PST 2012
selfserv with PID 92982 started at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4698: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 92982 at Tue Nov 27 17:47:29 PST 2012
kill -USR1 92982
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 92982 killed at Tue Nov 27 17:47:29 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93029 >/dev/null 2>/dev/null
selfserv with PID 93029 found at Tue Nov 27 17:47:29 PST 2012
selfserv with PID 93029 started at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4699: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93029 at Tue Nov 27 17:47:29 PST 2012
kill -USR1 93029
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93029 killed at Tue Nov 27 17:47:29 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93088 >/dev/null 2>/dev/null
selfserv with PID 93088 found at Tue Nov 27 17:47:29 PST 2012
selfserv with PID 93088 started at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4700: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93088 at Tue Nov 27 17:47:29 PST 2012
kill -USR1 93088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93088 killed at Tue Nov 27 17:47:29 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93135 >/dev/null 2>/dev/null
selfserv with PID 93135 found at Tue Nov 27 17:47:29 PST 2012
selfserv with PID 93135 started at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4701: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93135 at Tue Nov 27 17:47:29 PST 2012
kill -USR1 93135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93135 killed at Tue Nov 27 17:47:29 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93182 >/dev/null 2>/dev/null
selfserv with PID 93182 found at Tue Nov 27 17:47:30 PST 2012
selfserv with PID 93182 started at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4702: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93182 at Tue Nov 27 17:47:30 PST 2012
kill -USR1 93182
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93182 killed at Tue Nov 27 17:47:30 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93241 >/dev/null 2>/dev/null
selfserv with PID 93241 found at Tue Nov 27 17:47:30 PST 2012
selfserv with PID 93241 started at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4703: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93241 at Tue Nov 27 17:47:30 PST 2012
kill -USR1 93241
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93241 killed at Tue Nov 27 17:47:30 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93288 >/dev/null 2>/dev/null
selfserv with PID 93288 found at Tue Nov 27 17:47:30 PST 2012
selfserv with PID 93288 started at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4704: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93288 at Tue Nov 27 17:47:30 PST 2012
kill -USR1 93288
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93288 killed at Tue Nov 27 17:47:30 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93335 >/dev/null 2>/dev/null
selfserv with PID 93335 found at Tue Nov 27 17:47:30 PST 2012
selfserv with PID 93335 started at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4705: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93335 at Tue Nov 27 17:47:30 PST 2012
kill -USR1 93335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93335 killed at Tue Nov 27 17:47:30 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93394 >/dev/null 2>/dev/null
selfserv with PID 93394 found at Tue Nov 27 17:47:31 PST 2012
selfserv with PID 93394 started at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4706: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93394 at Tue Nov 27 17:47:31 PST 2012
kill -USR1 93394
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93394 killed at Tue Nov 27 17:47:31 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93441 >/dev/null 2>/dev/null
selfserv with PID 93441 found at Tue Nov 27 17:47:31 PST 2012
selfserv with PID 93441 started at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4707: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93441 at Tue Nov 27 17:47:31 PST 2012
kill -USR1 93441
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93441 killed at Tue Nov 27 17:47:31 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93488 >/dev/null 2>/dev/null
selfserv with PID 93488 found at Tue Nov 27 17:47:31 PST 2012
selfserv with PID 93488 started at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4708: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93488 at Tue Nov 27 17:47:31 PST 2012
kill -USR1 93488
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93488 killed at Tue Nov 27 17:47:31 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93547 >/dev/null 2>/dev/null
selfserv with PID 93547 found at Tue Nov 27 17:47:31 PST 2012
selfserv with PID 93547 started at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4709: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93547 at Tue Nov 27 17:47:31 PST 2012
kill -USR1 93547
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93547 killed at Tue Nov 27 17:47:31 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93594 >/dev/null 2>/dev/null
selfserv with PID 93594 found at Tue Nov 27 17:47:32 PST 2012
selfserv with PID 93594 started at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4710: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93594 at Tue Nov 27 17:47:32 PST 2012
kill -USR1 93594
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93594 killed at Tue Nov 27 17:47:32 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93641 >/dev/null 2>/dev/null
selfserv with PID 93641 found at Tue Nov 27 17:47:32 PST 2012
selfserv with PID 93641 started at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4711: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93641 at Tue Nov 27 17:47:32 PST 2012
kill -USR1 93641
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93641 killed at Tue Nov 27 17:47:32 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93700 >/dev/null 2>/dev/null
selfserv with PID 93700 found at Tue Nov 27 17:47:32 PST 2012
selfserv with PID 93700 started at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4712: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93700 at Tue Nov 27 17:47:32 PST 2012
kill -USR1 93700
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93700 killed at Tue Nov 27 17:47:32 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93747 >/dev/null 2>/dev/null
selfserv with PID 93747 found at Tue Nov 27 17:47:32 PST 2012
selfserv with PID 93747 started at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4713: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93747 at Tue Nov 27 17:47:32 PST 2012
kill -USR1 93747
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93747 killed at Tue Nov 27 17:47:32 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93794 >/dev/null 2>/dev/null
selfserv with PID 93794 found at Tue Nov 27 17:47:32 PST 2012
selfserv with PID 93794 started at Tue Nov 27 17:47:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4714: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 93794 at Tue Nov 27 17:47:33 PST 2012
kill -USR1 93794
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93794 killed at Tue Nov 27 17:47:33 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93853 >/dev/null 2>/dev/null
selfserv with PID 93853 found at Tue Nov 27 17:47:33 PST 2012
selfserv with PID 93853 started at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4715: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93853 at Tue Nov 27 17:47:33 PST 2012
kill -USR1 93853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93853 killed at Tue Nov 27 17:47:33 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93900 >/dev/null 2>/dev/null
selfserv with PID 93900 found at Tue Nov 27 17:47:33 PST 2012
selfserv with PID 93900 started at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4716: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93900 at Tue Nov 27 17:47:33 PST 2012
kill -USR1 93900
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93900 killed at Tue Nov 27 17:47:33 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 93947 >/dev/null 2>/dev/null
selfserv with PID 93947 found at Tue Nov 27 17:47:33 PST 2012
selfserv with PID 93947 started at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4717: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 93947 at Tue Nov 27 17:47:33 PST 2012
kill -USR1 93947
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 93947 killed at Tue Nov 27 17:47:33 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94006 >/dev/null 2>/dev/null
selfserv with PID 94006 found at Tue Nov 27 17:47:33 PST 2012
selfserv with PID 94006 started at Tue Nov 27 17:47:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4718: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94006 at Tue Nov 27 17:47:34 PST 2012
kill -USR1 94006
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94006 killed at Tue Nov 27 17:47:34 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94053 >/dev/null 2>/dev/null
selfserv with PID 94053 found at Tue Nov 27 17:47:34 PST 2012
selfserv with PID 94053 started at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4719: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94053 at Tue Nov 27 17:47:34 PST 2012
kill -USR1 94053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94053 killed at Tue Nov 27 17:47:34 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94100 >/dev/null 2>/dev/null
selfserv with PID 94100 found at Tue Nov 27 17:47:34 PST 2012
selfserv with PID 94100 started at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4720: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94100 at Tue Nov 27 17:47:34 PST 2012
kill -USR1 94100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94100 killed at Tue Nov 27 17:47:34 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94159 >/dev/null 2>/dev/null
selfserv with PID 94159 found at Tue Nov 27 17:47:34 PST 2012
selfserv with PID 94159 started at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4721: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94159 at Tue Nov 27 17:47:34 PST 2012
kill -USR1 94159
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94159 killed at Tue Nov 27 17:47:34 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94206 >/dev/null 2>/dev/null
selfserv with PID 94206 found at Tue Nov 27 17:47:34 PST 2012
selfserv with PID 94206 started at Tue Nov 27 17:47:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4722: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94206 at Tue Nov 27 17:47:35 PST 2012
kill -USR1 94206
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94206 killed at Tue Nov 27 17:47:35 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94253 >/dev/null 2>/dev/null
selfserv with PID 94253 found at Tue Nov 27 17:47:35 PST 2012
selfserv with PID 94253 started at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4723: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94253 at Tue Nov 27 17:47:35 PST 2012
kill -USR1 94253
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94253 killed at Tue Nov 27 17:47:35 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94312 >/dev/null 2>/dev/null
selfserv with PID 94312 found at Tue Nov 27 17:47:35 PST 2012
selfserv with PID 94312 started at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4724: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94312 at Tue Nov 27 17:47:35 PST 2012
kill -USR1 94312
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94312 killed at Tue Nov 27 17:47:35 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94359 >/dev/null 2>/dev/null
selfserv with PID 94359 found at Tue Nov 27 17:47:35 PST 2012
selfserv with PID 94359 started at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4725: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94359 at Tue Nov 27 17:47:35 PST 2012
kill -USR1 94359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94359 killed at Tue Nov 27 17:47:35 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94406 >/dev/null 2>/dev/null
selfserv with PID 94406 found at Tue Nov 27 17:47:35 PST 2012
selfserv with PID 94406 started at Tue Nov 27 17:47:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4726: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94406 at Tue Nov 27 17:47:36 PST 2012
kill -USR1 94406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94406 killed at Tue Nov 27 17:47:36 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94465 >/dev/null 2>/dev/null
selfserv with PID 94465 found at Tue Nov 27 17:47:36 PST 2012
selfserv with PID 94465 started at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4727: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94465 at Tue Nov 27 17:47:36 PST 2012
kill -USR1 94465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94465 killed at Tue Nov 27 17:47:36 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94512 >/dev/null 2>/dev/null
selfserv with PID 94512 found at Tue Nov 27 17:47:36 PST 2012
selfserv with PID 94512 started at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4728: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94512 at Tue Nov 27 17:47:36 PST 2012
kill -USR1 94512
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94512 killed at Tue Nov 27 17:47:36 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94559 >/dev/null 2>/dev/null
selfserv with PID 94559 found at Tue Nov 27 17:47:36 PST 2012
selfserv with PID 94559 started at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4729: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94559 at Tue Nov 27 17:47:36 PST 2012
kill -USR1 94559
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94559 killed at Tue Nov 27 17:47:36 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94618 >/dev/null 2>/dev/null
selfserv with PID 94618 found at Tue Nov 27 17:47:36 PST 2012
selfserv with PID 94618 started at Tue Nov 27 17:47:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4730: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94618 at Tue Nov 27 17:47:37 PST 2012
kill -USR1 94618
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94618 killed at Tue Nov 27 17:47:37 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94665 >/dev/null 2>/dev/null
selfserv with PID 94665 found at Tue Nov 27 17:47:37 PST 2012
selfserv with PID 94665 started at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4731: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94665 at Tue Nov 27 17:47:37 PST 2012
kill -USR1 94665
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94665 killed at Tue Nov 27 17:47:37 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94712 >/dev/null 2>/dev/null
selfserv with PID 94712 found at Tue Nov 27 17:47:37 PST 2012
selfserv with PID 94712 started at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4732: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 94712 at Tue Nov 27 17:47:37 PST 2012
kill -USR1 94712
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94712 killed at Tue Nov 27 17:47:37 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94771 >/dev/null 2>/dev/null
selfserv with PID 94771 found at Tue Nov 27 17:47:37 PST 2012
selfserv with PID 94771 started at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4733: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94771 at Tue Nov 27 17:47:37 PST 2012
kill -USR1 94771
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94771 killed at Tue Nov 27 17:47:37 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94818 >/dev/null 2>/dev/null
selfserv with PID 94818 found at Tue Nov 27 17:47:37 PST 2012
selfserv with PID 94818 started at Tue Nov 27 17:47:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4734: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94818 at Tue Nov 27 17:47:38 PST 2012
kill -USR1 94818
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94818 killed at Tue Nov 27 17:47:38 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94865 >/dev/null 2>/dev/null
selfserv with PID 94865 found at Tue Nov 27 17:47:38 PST 2012
selfserv with PID 94865 started at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4735: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94865 at Tue Nov 27 17:47:38 PST 2012
kill -USR1 94865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94865 killed at Tue Nov 27 17:47:38 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94924 >/dev/null 2>/dev/null
selfserv with PID 94924 found at Tue Nov 27 17:47:38 PST 2012
selfserv with PID 94924 started at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4736: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94924 at Tue Nov 27 17:47:38 PST 2012
kill -USR1 94924
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94924 killed at Tue Nov 27 17:47:38 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 94971 >/dev/null 2>/dev/null
selfserv with PID 94971 found at Tue Nov 27 17:47:38 PST 2012
selfserv with PID 94971 started at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4737: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 94971 at Tue Nov 27 17:47:38 PST 2012
kill -USR1 94971
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 94971 killed at Tue Nov 27 17:47:38 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95018 >/dev/null 2>/dev/null
selfserv with PID 95018 found at Tue Nov 27 17:47:38 PST 2012
selfserv with PID 95018 started at Tue Nov 27 17:47:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4738: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95018 at Tue Nov 27 17:47:39 PST 2012
kill -USR1 95018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95018 killed at Tue Nov 27 17:47:39 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95077 >/dev/null 2>/dev/null
selfserv with PID 95077 found at Tue Nov 27 17:47:39 PST 2012
selfserv with PID 95077 started at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4739: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95077 at Tue Nov 27 17:47:39 PST 2012
kill -USR1 95077
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95077 killed at Tue Nov 27 17:47:39 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95124 >/dev/null 2>/dev/null
selfserv with PID 95124 found at Tue Nov 27 17:47:39 PST 2012
selfserv with PID 95124 started at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4740: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95124 at Tue Nov 27 17:47:39 PST 2012
kill -USR1 95124
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95124 killed at Tue Nov 27 17:47:39 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95171 >/dev/null 2>/dev/null
selfserv with PID 95171 found at Tue Nov 27 17:47:39 PST 2012
selfserv with PID 95171 started at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4741: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95171 at Tue Nov 27 17:47:39 PST 2012
kill -USR1 95171
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95171 killed at Tue Nov 27 17:47:39 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95230 >/dev/null 2>/dev/null
selfserv with PID 95230 found at Tue Nov 27 17:47:39 PST 2012
selfserv with PID 95230 started at Tue Nov 27 17:47:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4742: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95230 at Tue Nov 27 17:47:40 PST 2012
kill -USR1 95230
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95230 killed at Tue Nov 27 17:47:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95277 >/dev/null 2>/dev/null
selfserv with PID 95277 found at Tue Nov 27 17:47:40 PST 2012
selfserv with PID 95277 started at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4743: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95277 at Tue Nov 27 17:47:40 PST 2012
kill -USR1 95277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95277 killed at Tue Nov 27 17:47:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:47:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95324 >/dev/null 2>/dev/null
selfserv with PID 95324 found at Tue Nov 27 17:47:40 PST 2012
selfserv with PID 95324 started at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4744: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95324 at Tue Nov 27 17:47:40 PST 2012
kill -USR1 95324
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95324 killed at Tue Nov 27 17:47:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95383 >/dev/null 2>/dev/null
selfserv with PID 95383 found at Tue Nov 27 17:47:40 PST 2012
selfserv with PID 95383 started at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4745: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95383 at Tue Nov 27 17:47:40 PST 2012
kill -USR1 95383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95383 killed at Tue Nov 27 17:47:40 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95430 >/dev/null 2>/dev/null
selfserv with PID 95430 found at Tue Nov 27 17:47:40 PST 2012
selfserv with PID 95430 started at Tue Nov 27 17:47:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4746: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95430 at Tue Nov 27 17:47:41 PST 2012
kill -USR1 95430
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95430 killed at Tue Nov 27 17:47:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:47:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95477 >/dev/null 2>/dev/null
selfserv with PID 95477 found at Tue Nov 27 17:47:41 PST 2012
selfserv with PID 95477 started at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4747: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95477 at Tue Nov 27 17:47:41 PST 2012
kill -USR1 95477
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95477 killed at Tue Nov 27 17:47:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95536 >/dev/null 2>/dev/null
selfserv with PID 95536 found at Tue Nov 27 17:47:41 PST 2012
selfserv with PID 95536 started at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4748: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95536 at Tue Nov 27 17:47:41 PST 2012
kill -USR1 95536
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95536 killed at Tue Nov 27 17:47:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95583 >/dev/null 2>/dev/null
selfserv with PID 95583 found at Tue Nov 27 17:47:41 PST 2012
selfserv with PID 95583 started at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4749: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95583 at Tue Nov 27 17:47:41 PST 2012
kill -USR1 95583
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95583 killed at Tue Nov 27 17:47:41 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:47:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95630 >/dev/null 2>/dev/null
selfserv with PID 95630 found at Tue Nov 27 17:47:41 PST 2012
selfserv with PID 95630 started at Tue Nov 27 17:47:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4750: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 95630 at Tue Nov 27 17:47:42 PST 2012
kill -USR1 95630
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95630 killed at Tue Nov 27 17:47:42 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95698 >/dev/null 2>/dev/null
selfserv with PID 95698 found at Tue Nov 27 17:47:42 PST 2012
selfserv with PID 95698 started at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4751: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95698 at Tue Nov 27 17:47:42 PST 2012
kill -USR1 95698
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95698 killed at Tue Nov 27 17:47:42 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95745 >/dev/null 2>/dev/null
selfserv with PID 95745 found at Tue Nov 27 17:47:42 PST 2012
selfserv with PID 95745 started at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4752: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95745 at Tue Nov 27 17:47:42 PST 2012
kill -USR1 95745
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95745 killed at Tue Nov 27 17:47:42 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95792 >/dev/null 2>/dev/null
selfserv with PID 95792 found at Tue Nov 27 17:47:42 PST 2012
selfserv with PID 95792 started at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4753: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95792 at Tue Nov 27 17:47:42 PST 2012
kill -USR1 95792
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95792 killed at Tue Nov 27 17:47:42 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95851 >/dev/null 2>/dev/null
selfserv with PID 95851 found at Tue Nov 27 17:47:42 PST 2012
selfserv with PID 95851 started at Tue Nov 27 17:47:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4754: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 95851 at Tue Nov 27 17:47:43 PST 2012
kill -USR1 95851
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95851 killed at Tue Nov 27 17:47:43 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95898 >/dev/null 2>/dev/null
selfserv with PID 95898 found at Tue Nov 27 17:47:43 PST 2012
selfserv with PID 95898 started at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4755: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 95898 at Tue Nov 27 17:47:43 PST 2012
kill -USR1 95898
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95898 killed at Tue Nov 27 17:47:43 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 95945 >/dev/null 2>/dev/null
selfserv with PID 95945 found at Tue Nov 27 17:47:43 PST 2012
selfserv with PID 95945 started at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4756: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 95945 at Tue Nov 27 17:47:43 PST 2012
kill -USR1 95945
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 95945 killed at Tue Nov 27 17:47:43 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96004 >/dev/null 2>/dev/null
selfserv with PID 96004 found at Tue Nov 27 17:47:43 PST 2012
selfserv with PID 96004 started at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4757: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96004 at Tue Nov 27 17:47:43 PST 2012
kill -USR1 96004
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96004 killed at Tue Nov 27 17:47:43 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96051 >/dev/null 2>/dev/null
selfserv with PID 96051 found at Tue Nov 27 17:47:43 PST 2012
selfserv with PID 96051 started at Tue Nov 27 17:47:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4758: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96051 at Tue Nov 27 17:47:44 PST 2012
kill -USR1 96051
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96051 killed at Tue Nov 27 17:47:44 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96098 >/dev/null 2>/dev/null
selfserv with PID 96098 found at Tue Nov 27 17:47:44 PST 2012
selfserv with PID 96098 started at Tue Nov 27 17:47:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4759: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96098 at Tue Nov 27 17:47:44 PST 2012
kill -USR1 96098
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96098 killed at Tue Nov 27 17:47:44 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96157 >/dev/null 2>/dev/null
selfserv with PID 96157 found at Tue Nov 27 17:47:44 PST 2012
selfserv with PID 96157 started at Tue Nov 27 17:47:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4760: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96157 at Tue Nov 27 17:47:44 PST 2012
kill -USR1 96157
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96157 killed at Tue Nov 27 17:47:44 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96210 >/dev/null 2>/dev/null
selfserv with PID 96210 found at Tue Nov 27 17:47:45 PST 2012
selfserv with PID 96210 started at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4761: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96210 at Tue Nov 27 17:47:45 PST 2012
kill -USR1 96210
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96210 killed at Tue Nov 27 17:47:45 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96261 >/dev/null 2>/dev/null
selfserv with PID 96261 found at Tue Nov 27 17:47:45 PST 2012
selfserv with PID 96261 started at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4762: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96261 at Tue Nov 27 17:47:45 PST 2012
kill -USR1 96261
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96261 killed at Tue Nov 27 17:47:45 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96320 >/dev/null 2>/dev/null
selfserv with PID 96320 found at Tue Nov 27 17:47:45 PST 2012
selfserv with PID 96320 started at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4763: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96320 at Tue Nov 27 17:47:45 PST 2012
kill -USR1 96320
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96320 killed at Tue Nov 27 17:47:45 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96367 >/dev/null 2>/dev/null
selfserv with PID 96367 found at Tue Nov 27 17:47:45 PST 2012
selfserv with PID 96367 started at Tue Nov 27 17:47:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4764: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96367 at Tue Nov 27 17:47:45 PST 2012
kill -USR1 96367
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96367 killed at Tue Nov 27 17:47:46 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96414 >/dev/null 2>/dev/null
selfserv with PID 96414 found at Tue Nov 27 17:47:46 PST 2012
selfserv with PID 96414 started at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4765: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96414 at Tue Nov 27 17:47:46 PST 2012
kill -USR1 96414
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96414 killed at Tue Nov 27 17:47:46 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96473 >/dev/null 2>/dev/null
selfserv with PID 96473 found at Tue Nov 27 17:47:46 PST 2012
selfserv with PID 96473 started at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4766: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96473 at Tue Nov 27 17:47:46 PST 2012
kill -USR1 96473
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96473 killed at Tue Nov 27 17:47:46 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96520 >/dev/null 2>/dev/null
selfserv with PID 96520 found at Tue Nov 27 17:47:46 PST 2012
selfserv with PID 96520 started at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4767: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96520 at Tue Nov 27 17:47:46 PST 2012
kill -USR1 96520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96520 killed at Tue Nov 27 17:47:46 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96567 >/dev/null 2>/dev/null
selfserv with PID 96567 found at Tue Nov 27 17:47:46 PST 2012
selfserv with PID 96567 started at Tue Nov 27 17:47:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4768: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96567 at Tue Nov 27 17:47:47 PST 2012
kill -USR1 96567
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96567 killed at Tue Nov 27 17:47:47 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96626 >/dev/null 2>/dev/null
selfserv with PID 96626 found at Tue Nov 27 17:47:47 PST 2012
selfserv with PID 96626 started at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4769: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96626 at Tue Nov 27 17:47:47 PST 2012
kill -USR1 96626
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96626 killed at Tue Nov 27 17:47:47 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96673 >/dev/null 2>/dev/null
selfserv with PID 96673 found at Tue Nov 27 17:47:47 PST 2012
selfserv with PID 96673 started at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4770: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96673 at Tue Nov 27 17:47:47 PST 2012
kill -USR1 96673
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96673 killed at Tue Nov 27 17:47:47 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96720 >/dev/null 2>/dev/null
selfserv with PID 96720 found at Tue Nov 27 17:47:47 PST 2012
selfserv with PID 96720 started at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4771: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96720 at Tue Nov 27 17:47:47 PST 2012
kill -USR1 96720
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96720 killed at Tue Nov 27 17:47:47 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96779 >/dev/null 2>/dev/null
selfserv with PID 96779 found at Tue Nov 27 17:47:47 PST 2012
selfserv with PID 96779 started at Tue Nov 27 17:47:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4772: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96779 at Tue Nov 27 17:47:48 PST 2012
kill -USR1 96779
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96779 killed at Tue Nov 27 17:47:48 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96826 >/dev/null 2>/dev/null
selfserv with PID 96826 found at Tue Nov 27 17:47:48 PST 2012
selfserv with PID 96826 started at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4773: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96826 at Tue Nov 27 17:47:48 PST 2012
kill -USR1 96826
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96826 killed at Tue Nov 27 17:47:48 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96873 >/dev/null 2>/dev/null
selfserv with PID 96873 found at Tue Nov 27 17:47:48 PST 2012
selfserv with PID 96873 started at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4774: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96873 at Tue Nov 27 17:47:48 PST 2012
kill -USR1 96873
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96873 killed at Tue Nov 27 17:47:48 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96932 >/dev/null 2>/dev/null
selfserv with PID 96932 found at Tue Nov 27 17:47:48 PST 2012
selfserv with PID 96932 started at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4775: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96932 at Tue Nov 27 17:47:48 PST 2012
kill -USR1 96932
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96932 killed at Tue Nov 27 17:47:48 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96979 >/dev/null 2>/dev/null
selfserv with PID 96979 found at Tue Nov 27 17:47:48 PST 2012
selfserv with PID 96979 started at Tue Nov 27 17:47:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4776: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96979 at Tue Nov 27 17:47:49 PST 2012
kill -USR1 96979
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96979 killed at Tue Nov 27 17:47:49 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97026 >/dev/null 2>/dev/null
selfserv with PID 97026 found at Tue Nov 27 17:47:49 PST 2012
selfserv with PID 97026 started at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4777: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97026 at Tue Nov 27 17:47:49 PST 2012
kill -USR1 97026
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97026 killed at Tue Nov 27 17:47:49 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97085 >/dev/null 2>/dev/null
selfserv with PID 97085 found at Tue Nov 27 17:47:49 PST 2012
selfserv with PID 97085 started at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4778: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97085 at Tue Nov 27 17:47:49 PST 2012
kill -USR1 97085
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97085 killed at Tue Nov 27 17:47:49 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97132 >/dev/null 2>/dev/null
selfserv with PID 97132 found at Tue Nov 27 17:47:49 PST 2012
selfserv with PID 97132 started at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4779: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97132 at Tue Nov 27 17:47:49 PST 2012
kill -USR1 97132
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97132 killed at Tue Nov 27 17:47:49 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97179 >/dev/null 2>/dev/null
selfserv with PID 97179 found at Tue Nov 27 17:47:49 PST 2012
selfserv with PID 97179 started at Tue Nov 27 17:47:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4780: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97179 at Tue Nov 27 17:47:50 PST 2012
kill -USR1 97179
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97179 killed at Tue Nov 27 17:47:50 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97238 >/dev/null 2>/dev/null
selfserv with PID 97238 found at Tue Nov 27 17:47:50 PST 2012
selfserv with PID 97238 started at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4781: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97238 at Tue Nov 27 17:47:50 PST 2012
kill -USR1 97238
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97238 killed at Tue Nov 27 17:47:50 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97285 >/dev/null 2>/dev/null
selfserv with PID 97285 found at Tue Nov 27 17:47:50 PST 2012
selfserv with PID 97285 started at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4782: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97285 at Tue Nov 27 17:47:50 PST 2012
kill -USR1 97285
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97285 killed at Tue Nov 27 17:47:50 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97332 >/dev/null 2>/dev/null
selfserv with PID 97332 found at Tue Nov 27 17:47:50 PST 2012
selfserv with PID 97332 started at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4783: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97332 at Tue Nov 27 17:47:50 PST 2012
kill -USR1 97332
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97332 killed at Tue Nov 27 17:47:50 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97391 >/dev/null 2>/dev/null
selfserv with PID 97391 found at Tue Nov 27 17:47:50 PST 2012
selfserv with PID 97391 started at Tue Nov 27 17:47:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4784: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97391 at Tue Nov 27 17:47:51 PST 2012
kill -USR1 97391
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97391 killed at Tue Nov 27 17:47:51 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97438 >/dev/null 2>/dev/null
selfserv with PID 97438 found at Tue Nov 27 17:47:51 PST 2012
selfserv with PID 97438 started at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4785: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97438 at Tue Nov 27 17:47:51 PST 2012
kill -USR1 97438
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97438 killed at Tue Nov 27 17:47:51 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97485 >/dev/null 2>/dev/null
selfserv with PID 97485 found at Tue Nov 27 17:47:51 PST 2012
selfserv with PID 97485 started at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4786: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97485 at Tue Nov 27 17:47:51 PST 2012
kill -USR1 97485
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97485 killed at Tue Nov 27 17:47:51 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97544 >/dev/null 2>/dev/null
selfserv with PID 97544 found at Tue Nov 27 17:47:51 PST 2012
selfserv with PID 97544 started at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4787: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97544 at Tue Nov 27 17:47:51 PST 2012
kill -USR1 97544
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97544 killed at Tue Nov 27 17:47:51 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97591 >/dev/null 2>/dev/null
selfserv with PID 97591 found at Tue Nov 27 17:47:52 PST 2012
selfserv with PID 97591 started at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4788: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97591 at Tue Nov 27 17:47:52 PST 2012
kill -USR1 97591
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97591 killed at Tue Nov 27 17:47:52 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97638 >/dev/null 2>/dev/null
selfserv with PID 97638 found at Tue Nov 27 17:47:52 PST 2012
selfserv with PID 97638 started at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4789: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97638 at Tue Nov 27 17:47:52 PST 2012
kill -USR1 97638
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97638 killed at Tue Nov 27 17:47:52 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97697 >/dev/null 2>/dev/null
selfserv with PID 97697 found at Tue Nov 27 17:47:52 PST 2012
selfserv with PID 97697 started at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4790: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97697 at Tue Nov 27 17:47:52 PST 2012
kill -USR1 97697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97697 killed at Tue Nov 27 17:47:52 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97744 >/dev/null 2>/dev/null
selfserv with PID 97744 found at Tue Nov 27 17:47:52 PST 2012
selfserv with PID 97744 started at Tue Nov 27 17:47:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4791: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97744 at Tue Nov 27 17:47:52 PST 2012
kill -USR1 97744
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97744 killed at Tue Nov 27 17:47:52 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97791 >/dev/null 2>/dev/null
selfserv with PID 97791 found at Tue Nov 27 17:47:53 PST 2012
selfserv with PID 97791 started at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4792: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97791 at Tue Nov 27 17:47:53 PST 2012
kill -USR1 97791
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97791 killed at Tue Nov 27 17:47:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97850 >/dev/null 2>/dev/null
selfserv with PID 97850 found at Tue Nov 27 17:47:53 PST 2012
selfserv with PID 97850 started at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4793: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97850 at Tue Nov 27 17:47:53 PST 2012
kill -USR1 97850
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97850 killed at Tue Nov 27 17:47:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97897 >/dev/null 2>/dev/null
selfserv with PID 97897 found at Tue Nov 27 17:47:53 PST 2012
selfserv with PID 97897 started at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4794: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97897 at Tue Nov 27 17:47:53 PST 2012
kill -USR1 97897
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97897 killed at Tue Nov 27 17:47:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97944 >/dev/null 2>/dev/null
selfserv with PID 97944 found at Tue Nov 27 17:47:53 PST 2012
selfserv with PID 97944 started at Tue Nov 27 17:47:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4795: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 97944 at Tue Nov 27 17:47:53 PST 2012
kill -USR1 97944
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97944 killed at Tue Nov 27 17:47:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98003 >/dev/null 2>/dev/null
selfserv with PID 98003 found at Tue Nov 27 17:47:54 PST 2012
selfserv with PID 98003 started at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4796: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98003 at Tue Nov 27 17:47:54 PST 2012
kill -USR1 98003
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98003 killed at Tue Nov 27 17:47:54 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98050 >/dev/null 2>/dev/null
selfserv with PID 98050 found at Tue Nov 27 17:47:54 PST 2012
selfserv with PID 98050 started at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4797: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98050 at Tue Nov 27 17:47:54 PST 2012
kill -USR1 98050
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98050 killed at Tue Nov 27 17:47:54 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98097 >/dev/null 2>/dev/null
selfserv with PID 98097 found at Tue Nov 27 17:47:54 PST 2012
selfserv with PID 98097 started at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4798: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98097 at Tue Nov 27 17:47:54 PST 2012
kill -USR1 98097
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98097 killed at Tue Nov 27 17:47:54 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98156 >/dev/null 2>/dev/null
selfserv with PID 98156 found at Tue Nov 27 17:47:54 PST 2012
selfserv with PID 98156 started at Tue Nov 27 17:47:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4799: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98156 at Tue Nov 27 17:47:55 PST 2012
kill -USR1 98156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98156 killed at Tue Nov 27 17:47:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98203 >/dev/null 2>/dev/null
selfserv with PID 98203 found at Tue Nov 27 17:47:55 PST 2012
selfserv with PID 98203 started at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4800: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98203 at Tue Nov 27 17:47:55 PST 2012
kill -USR1 98203
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98203 killed at Tue Nov 27 17:47:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98250 >/dev/null 2>/dev/null
selfserv with PID 98250 found at Tue Nov 27 17:47:55 PST 2012
selfserv with PID 98250 started at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4801: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98250 at Tue Nov 27 17:47:55 PST 2012
kill -USR1 98250
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98250 killed at Tue Nov 27 17:47:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98309 >/dev/null 2>/dev/null
selfserv with PID 98309 found at Tue Nov 27 17:47:55 PST 2012
selfserv with PID 98309 started at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4802: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98309 at Tue Nov 27 17:47:55 PST 2012
kill -USR1 98309
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98309 killed at Tue Nov 27 17:47:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98356 >/dev/null 2>/dev/null
selfserv with PID 98356 found at Tue Nov 27 17:47:55 PST 2012
selfserv with PID 98356 started at Tue Nov 27 17:47:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4803: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98356 at Tue Nov 27 17:47:56 PST 2012
kill -USR1 98356
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98356 killed at Tue Nov 27 17:47:56 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98403 >/dev/null 2>/dev/null
selfserv with PID 98403 found at Tue Nov 27 17:47:56 PST 2012
selfserv with PID 98403 started at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4804: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98403 at Tue Nov 27 17:47:56 PST 2012
kill -USR1 98403
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98403 killed at Tue Nov 27 17:47:56 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98462 >/dev/null 2>/dev/null
selfserv with PID 98462 found at Tue Nov 27 17:47:56 PST 2012
selfserv with PID 98462 started at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4805: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98462 at Tue Nov 27 17:47:56 PST 2012
kill -USR1 98462
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98462 killed at Tue Nov 27 17:47:56 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98509 >/dev/null 2>/dev/null
selfserv with PID 98509 found at Tue Nov 27 17:47:56 PST 2012
selfserv with PID 98509 started at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4806: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98509 at Tue Nov 27 17:47:56 PST 2012
kill -USR1 98509
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98509 killed at Tue Nov 27 17:47:56 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:47:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98556 >/dev/null 2>/dev/null
selfserv with PID 98556 found at Tue Nov 27 17:47:56 PST 2012
selfserv with PID 98556 started at Tue Nov 27 17:47:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4807: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98556 at Tue Nov 27 17:47:57 PST 2012
kill -USR1 98556
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98556 killed at Tue Nov 27 17:47:57 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98615 >/dev/null 2>/dev/null
selfserv with PID 98615 found at Tue Nov 27 17:47:57 PST 2012
selfserv with PID 98615 started at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4808: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98615 at Tue Nov 27 17:47:57 PST 2012
kill -USR1 98615
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98615 killed at Tue Nov 27 17:47:57 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98662 >/dev/null 2>/dev/null
selfserv with PID 98662 found at Tue Nov 27 17:47:57 PST 2012
selfserv with PID 98662 started at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4809: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98662 at Tue Nov 27 17:47:57 PST 2012
kill -USR1 98662
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98662 killed at Tue Nov 27 17:47:57 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:47:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98709 >/dev/null 2>/dev/null
selfserv with PID 98709 found at Tue Nov 27 17:47:57 PST 2012
selfserv with PID 98709 started at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4810: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98709 at Tue Nov 27 17:47:57 PST 2012
kill -USR1 98709
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98709 killed at Tue Nov 27 17:47:57 PST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/authin.tl.tmp
0
selfserv starting at Tue Nov 27 17:47:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:47:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
selfserv with PID 98763 started at Tue Nov 27 17:47:58 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
ssl.sh: #4811: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
ssl.sh: #4812: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
ssl.sh: #4813: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
ssl.sh: #4814: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
ssl.sh: #4815: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:58 PST 2012
ssl.sh: #4816: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4817: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4818: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4819: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4820: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4821: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4822: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:47:59 PST 2012
ssl.sh: #4823: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
================= CRL Reloaded =============
ssl.sh: #4824: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
ssl.sh: #4825: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
ssl.sh: #4826: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
ssl.sh: #4827: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
ssl.sh: #4828: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
ssl.sh: #4829: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:00 PST 2012
ssl.sh: #4830: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:01 PST 2012
ssl.sh: #4831: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:01 PST 2012
ssl.sh: #4832: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:01 PST 2012
ssl.sh: #4833: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:01 PST 2012
ssl.sh: #4834: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:01 PST 2012
ssl.sh: #4835: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:01 PST 2012
ssl.sh: #4836: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
ssl.sh: #4837: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
================= CRL Reloaded =============
ssl.sh: #4838: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
ssl.sh: #4839: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
ssl.sh: #4840: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
ssl.sh: #4841: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
ssl.sh: #4842: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:02 PST 2012
ssl.sh: #4843: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4844: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4845: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4846: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4847: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4848: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4849: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:03 PST 2012
ssl.sh: #4850: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 98763 >/dev/null 2>/dev/null
selfserv with PID 98763 found at Tue Nov 27 17:48:04 PST 2012
ssl.sh: #4851: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98763 at Tue Nov 27 17:48:04 PST 2012
kill -USR1 98763
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98763 killed at Tue Nov 27 17:48:04 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:48:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:04 PST 2012
selfserv with PID 303 started at Tue Nov 27 17:48:04 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:04 PST 2012
ssl.sh: #4852: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:04 PST 2012
ssl.sh: #4853: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:04 PST 2012
ssl.sh: #4854: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:04 PST 2012
ssl.sh: #4855: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:04 PST 2012
ssl.sh: #4856: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:05 PST 2012
ssl.sh: #4857: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:05 PST 2012
ssl.sh: #4858: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:05 PST 2012
ssl.sh: #4859: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:05 PST 2012
ssl.sh: #4860: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:05 PST 2012
ssl.sh: #4861: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:05 PST 2012
ssl.sh: #4862: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
ssl.sh: #4863: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
ssl.sh: #4864: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
================= CRL Reloaded =============
ssl.sh: #4865: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
ssl.sh: #4866: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
ssl.sh: #4867: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
ssl.sh: #4868: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:06 PST 2012
ssl.sh: #4869: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4870: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4871: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4872: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4873: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4874: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4875: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:07 PST 2012
ssl.sh: #4876: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
ssl.sh: #4877: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
ssl.sh: #4878: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
================= CRL Reloaded =============
ssl.sh: #4879: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
ssl.sh: #4880: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
ssl.sh: #4881: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
ssl.sh: #4882: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:08 PST 2012
ssl.sh: #4883: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:09 PST 2012
ssl.sh: #4884: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:09 PST 2012
ssl.sh: #4885: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:09 PST 2012
ssl.sh: #4886: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:09 PST 2012
ssl.sh: #4887: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:09 PST 2012
ssl.sh: #4888: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:09 PST 2012
ssl.sh: #4889: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:10 PST 2012
ssl.sh: #4890: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:10 PST 2012
ssl.sh: #4891: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 303 >/dev/null 2>/dev/null
selfserv with PID 303 found at Tue Nov 27 17:48:10 PST 2012
ssl.sh: #4892: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 303 at Tue Nov 27 17:48:10 PST 2012
kill -USR1 303
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 303 killed at Tue Nov 27 17:48:10 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:48:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:10 PST 2012
selfserv with PID 1714 started at Tue Nov 27 17:48:10 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:10 PST 2012
ssl.sh: #4893: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:10 PST 2012
ssl.sh: #4894: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:10 PST 2012
ssl.sh: #4895: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:11 PST 2012
ssl.sh: #4896: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:11 PST 2012
ssl.sh: #4897: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:11 PST 2012
ssl.sh: #4898: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:11 PST 2012
ssl.sh: #4899: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:11 PST 2012
ssl.sh: #4900: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:11 PST 2012
ssl.sh: #4901: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:12 PST 2012
ssl.sh: #4902: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:12 PST 2012
ssl.sh: #4903: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:12 PST 2012
ssl.sh: #4904: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:12 PST 2012
ssl.sh: #4905: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:12 PST 2012
================= CRL Reloaded =============
ssl.sh: #4906: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:12 PST 2012
ssl.sh: #4907: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:13 PST 2012
ssl.sh: #4908: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:13 PST 2012
ssl.sh: #4909: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:13 PST 2012
ssl.sh: #4910: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:13 PST 2012
ssl.sh: #4911: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:13 PST 2012
ssl.sh: #4912: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:13 PST 2012
ssl.sh: #4913: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:14 PST 2012
ssl.sh: #4914: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:14 PST 2012
ssl.sh: #4915: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:14 PST 2012
ssl.sh: #4916: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:14 PST 2012
ssl.sh: #4917: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:15 PST 2012
ssl.sh: #4918: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:15 PST 2012
ssl.sh: #4919: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:15 PST 2012
================= CRL Reloaded =============
ssl.sh: #4920: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:15 PST 2012
ssl.sh: #4921: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:15 PST 2012
ssl.sh: #4922: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:15 PST 2012
ssl.sh: #4923: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:16 PST 2012
ssl.sh: #4924: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:16 PST 2012
ssl.sh: #4925: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:16 PST 2012
ssl.sh: #4926: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:16 PST 2012
ssl.sh: #4927: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:16 PST 2012
ssl.sh: #4928: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:16 PST 2012
ssl.sh: #4929: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:17 PST 2012
ssl.sh: #4930: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:17 PST 2012
ssl.sh: #4931: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:17 PST 2012
ssl.sh: #4932: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1714 >/dev/null 2>/dev/null
selfserv with PID 1714 found at Tue Nov 27 17:48:17 PST 2012
ssl.sh: #4933: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1714 at Tue Nov 27 17:48:17 PST 2012
kill -USR1 1714
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1714 killed at Tue Nov 27 17:48:17 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:48:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:17 PST 2012
selfserv with PID 3127 started at Tue Nov 27 17:48:17 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:17 PST 2012
ssl.sh: #4934: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:18 PST 2012
ssl.sh: #4935: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:18 PST 2012
ssl.sh: #4936: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:18 PST 2012
ssl.sh: #4937: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:18 PST 2012
ssl.sh: #4938: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:18 PST 2012
ssl.sh: #4939: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:18 PST 2012
ssl.sh: #4940: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:19 PST 2012
ssl.sh: #4941: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:19 PST 2012
ssl.sh: #4942: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:19 PST 2012
ssl.sh: #4943: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:19 PST 2012
ssl.sh: #4944: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:19 PST 2012
ssl.sh: #4945: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:19 PST 2012
ssl.sh: #4946: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:20 PST 2012
================= CRL Reloaded =============
ssl.sh: #4947: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:20 PST 2012
ssl.sh: #4948: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:20 PST 2012
ssl.sh: #4949: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:20 PST 2012
ssl.sh: #4950: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:20 PST 2012
ssl.sh: #4951: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:20 PST 2012
ssl.sh: #4952: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:21 PST 2012
ssl.sh: #4953: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:21 PST 2012
ssl.sh: #4954: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:21 PST 2012
ssl.sh: #4955: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:21 PST 2012
ssl.sh: #4956: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:21 PST 2012
ssl.sh: #4957: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:21 PST 2012
ssl.sh: #4958: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:22 PST 2012
ssl.sh: #4959: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:22 PST 2012
ssl.sh: #4960: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:22 PST 2012
================= CRL Reloaded =============
ssl.sh: #4961: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:22 PST 2012
ssl.sh: #4962: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:22 PST 2012
ssl.sh: #4963: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:22 PST 2012
ssl.sh: #4964: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:23 PST 2012
ssl.sh: #4965: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:23 PST 2012
ssl.sh: #4966: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:23 PST 2012
ssl.sh: #4967: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:23 PST 2012
ssl.sh: #4968: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:23 PST 2012
ssl.sh: #4969: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:23 PST 2012
ssl.sh: #4970: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:24 PST 2012
ssl.sh: #4971: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:24 PST 2012
ssl.sh: #4972: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:24 PST 2012
ssl.sh: #4973: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3127 >/dev/null 2>/dev/null
selfserv with PID 3127 found at Tue Nov 27 17:48:24 PST 2012
ssl.sh: #4974: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3127 at Tue Nov 27 17:48:24 PST 2012
kill -USR1 3127
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3127 killed at Tue Nov 27 17:48:24 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:48:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4538 >/dev/null 2>/dev/null
selfserv with PID 4538 found at Tue Nov 27 17:48:24 PST 2012
selfserv with PID 4538 started at Tue Nov 27 17:48:24 PST 2012
trying to kill selfserv with PID 4538 at Tue Nov 27 17:48:24 PST 2012
kill -USR1 4538
./ssl.sh: line 173:  4538 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 4538 killed at Tue Nov 27 17:48:24 PST 2012
selfserv starting at Tue Nov 27 17:48:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:24 PST 2012
selfserv with PID 4571 started at Tue Nov 27 17:48:24 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:24 PST 2012
ssl.sh: #4975: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4976: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4977: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4978: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4979: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4980: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4981: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:25 PST 2012
ssl.sh: #4982: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:26 PST 2012
ssl.sh: #4983: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:26 PST 2012
ssl.sh: #4984: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:26 PST 2012
ssl.sh: #4985: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:26 PST 2012
ssl.sh: #4986: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:26 PST 2012
ssl.sh: #4987: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:26 PST 2012
================= CRL Reloaded =============
ssl.sh: #4988: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4989: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4990: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4991: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4992: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4993: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4994: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:27 PST 2012
ssl.sh: #4995: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:28 PST 2012
ssl.sh: #4996: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:28 PST 2012
ssl.sh: #4997: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:28 PST 2012
ssl.sh: #4998: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:28 PST 2012
ssl.sh: #4999: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:28 PST 2012
ssl.sh: #5000: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:28 PST 2012
ssl.sh: #5001: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
================= CRL Reloaded =============
ssl.sh: #5002: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
ssl.sh: #5003: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
ssl.sh: #5004: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
ssl.sh: #5005: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
ssl.sh: #5006: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
ssl.sh: #5007: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:29 PST 2012
ssl.sh: #5008: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:30 PST 2012
ssl.sh: #5009: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:30 PST 2012
ssl.sh: #5010: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:30 PST 2012
ssl.sh: #5011: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:30 PST 2012
ssl.sh: #5012: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:30 PST 2012
ssl.sh: #5013: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:30 PST 2012
ssl.sh: #5014: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Tue Nov 27 17:48:31 PST 2012
ssl.sh: #5015: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4571 at Tue Nov 27 17:48:31 PST 2012
kill -USR1 4571
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4571 killed at Tue Nov 27 17:48:31 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:48:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:31 PST 2012
selfserv with PID 5982 started at Tue Nov 27 17:48:31 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:31 PST 2012
ssl.sh: #5016: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:31 PST 2012
ssl.sh: #5017: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:31 PST 2012
ssl.sh: #5018: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:31 PST 2012
ssl.sh: #5019: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:31 PST 2012
ssl.sh: #5020: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5021: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5022: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5023: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5024: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5025: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5026: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:32 PST 2012
ssl.sh: #5027: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:33 PST 2012
ssl.sh: #5028: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:33 PST 2012
================= CRL Reloaded =============
ssl.sh: #5029: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:33 PST 2012
ssl.sh: #5030: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:33 PST 2012
ssl.sh: #5031: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:33 PST 2012
ssl.sh: #5032: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:33 PST 2012
ssl.sh: #5033: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5034: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5035: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5036: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5037: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5038: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5039: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:34 PST 2012
ssl.sh: #5040: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
ssl.sh: #5041: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
ssl.sh: #5042: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
================= CRL Reloaded =============
ssl.sh: #5043: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
ssl.sh: #5044: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
ssl.sh: #5045: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
ssl.sh: #5046: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:35 PST 2012
ssl.sh: #5047: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:36 PST 2012
ssl.sh: #5048: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:36 PST 2012
ssl.sh: #5049: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:36 PST 2012
ssl.sh: #5050: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:36 PST 2012
ssl.sh: #5051: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:36 PST 2012
ssl.sh: #5052: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:36 PST 2012
ssl.sh: #5053: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:37 PST 2012
ssl.sh: #5054: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:37 PST 2012
ssl.sh: #5055: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5982 >/dev/null 2>/dev/null
selfserv with PID 5982 found at Tue Nov 27 17:48:37 PST 2012
ssl.sh: #5056: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5982 at Tue Nov 27 17:48:37 PST 2012
kill -USR1 5982
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 5982 killed at Tue Nov 27 17:48:37 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:48:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:37 PST 2012
selfserv with PID 7393 started at Tue Nov 27 17:48:37 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:37 PST 2012
ssl.sh: #5057: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:37 PST 2012
ssl.sh: #5058: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:37 PST 2012
ssl.sh: #5059: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:38 PST 2012
ssl.sh: #5060: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:38 PST 2012
ssl.sh: #5061: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:38 PST 2012
ssl.sh: #5062: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:38 PST 2012
ssl.sh: #5063: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:38 PST 2012
ssl.sh: #5064: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:38 PST 2012
ssl.sh: #5065: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
ssl.sh: #5066: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
ssl.sh: #5067: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
ssl.sh: #5068: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
ssl.sh: #5069: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
================= CRL Reloaded =============
ssl.sh: #5070: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
ssl.sh: #5071: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:39 PST 2012
ssl.sh: #5072: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5073: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5074: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5075: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5076: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5077: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5078: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:40 PST 2012
ssl.sh: #5079: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:41 PST 2012
ssl.sh: #5080: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:41 PST 2012
ssl.sh: #5081: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:41 PST 2012
ssl.sh: #5082: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:41 PST 2012
ssl.sh: #5083: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:41 PST 2012
================= CRL Reloaded =============
ssl.sh: #5084: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:41 PST 2012
ssl.sh: #5085: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5086: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5087: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5088: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5089: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5090: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5091: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:42 PST 2012
ssl.sh: #5092: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:43 PST 2012
ssl.sh: #5093: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:43 PST 2012
ssl.sh: #5094: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:43 PST 2012
ssl.sh: #5095: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:43 PST 2012
ssl.sh: #5096: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7393 >/dev/null 2>/dev/null
selfserv with PID 7393 found at Tue Nov 27 17:48:43 PST 2012
ssl.sh: #5097: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7393 at Tue Nov 27 17:48:43 PST 2012
kill -USR1 7393
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 7393 killed at Tue Nov 27 17:48:43 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:48:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:43 PST 2012
selfserv with PID 8804 started at Tue Nov 27 17:48:43 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:44 PST 2012
ssl.sh: #5098: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:44 PST 2012
ssl.sh: #5099: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:44 PST 2012
ssl.sh: #5100: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:44 PST 2012
ssl.sh: #5101: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:44 PST 2012
ssl.sh: #5102: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:45 PST 2012
ssl.sh: #5103: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:45 PST 2012
ssl.sh: #5104: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:45 PST 2012
ssl.sh: #5105: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:45 PST 2012
ssl.sh: #5106: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:46 PST 2012
ssl.sh: #5107: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:46 PST 2012
ssl.sh: #5108: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:46 PST 2012
ssl.sh: #5109: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:46 PST 2012
ssl.sh: #5110: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:46 PST 2012
================= CRL Reloaded =============
ssl.sh: #5111: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:46 PST 2012
ssl.sh: #5112: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:47 PST 2012
ssl.sh: #5113: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:47 PST 2012
ssl.sh: #5114: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:47 PST 2012
ssl.sh: #5115: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:47 PST 2012
ssl.sh: #5116: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:47 PST 2012
ssl.sh: #5117: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:47 PST 2012
ssl.sh: #5118: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:48 PST 2012
ssl.sh: #5119: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:48 PST 2012
ssl.sh: #5120: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:48 PST 2012
ssl.sh: #5121: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:48 PST 2012
ssl.sh: #5122: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:48 PST 2012
ssl.sh: #5123: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:48 PST 2012
ssl.sh: #5124: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:49 PST 2012
================= CRL Reloaded =============
ssl.sh: #5125: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:49 PST 2012
ssl.sh: #5126: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:49 PST 2012
ssl.sh: #5127: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:49 PST 2012
ssl.sh: #5128: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:49 PST 2012
ssl.sh: #5129: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:49 PST 2012
ssl.sh: #5130: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:50 PST 2012
ssl.sh: #5131: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:50 PST 2012
ssl.sh: #5132: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:50 PST 2012
ssl.sh: #5133: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:50 PST 2012
ssl.sh: #5134: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:50 PST 2012
ssl.sh: #5135: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:50 PST 2012
ssl.sh: #5136: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:51 PST 2012
ssl.sh: #5137: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8804 >/dev/null 2>/dev/null
selfserv with PID 8804 found at Tue Nov 27 17:48:51 PST 2012
ssl.sh: #5138: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8804 at Tue Nov 27 17:48:51 PST 2012
kill -USR1 8804
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 8804 killed at Tue Nov 27 17:48:51 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:48:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:51 PST 2012
selfserv with PID 10225 started at Tue Nov 27 17:48:51 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:51 PST 2012
ssl.sh: #5139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:51 PST 2012
ssl.sh: #5140: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:51 PST 2012
ssl.sh: #5141: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:52 PST 2012
ssl.sh: #5142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:52 PST 2012
ssl.sh: #5143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:52 PST 2012
ssl.sh: #5144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:52 PST 2012
ssl.sh: #5145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:52 PST 2012
ssl.sh: #5146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:52 PST 2012
ssl.sh: #5147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:53 PST 2012
ssl.sh: #5148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:53 PST 2012
ssl.sh: #5149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:53 PST 2012
ssl.sh: #5150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:53 PST 2012
ssl.sh: #5151: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:53 PST 2012
================= CRL Reloaded =============
ssl.sh: #5152: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:53 PST 2012
ssl.sh: #5153: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:54 PST 2012
ssl.sh: #5154: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:54 PST 2012
ssl.sh: #5155: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:54 PST 2012
ssl.sh: #5156: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:54 PST 2012
ssl.sh: #5157: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:54 PST 2012
ssl.sh: #5158: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:54 PST 2012
ssl.sh: #5159: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:55 PST 2012
ssl.sh: #5160: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:55 PST 2012
ssl.sh: #5161: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:55 PST 2012
ssl.sh: #5162: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:55 PST 2012
ssl.sh: #5163: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:55 PST 2012
ssl.sh: #5164: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:56 PST 2012
ssl.sh: #5165: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:56 PST 2012
================= CRL Reloaded =============
ssl.sh: #5166: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:56 PST 2012
ssl.sh: #5167: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:56 PST 2012
ssl.sh: #5168: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:56 PST 2012
ssl.sh: #5169: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:56 PST 2012
ssl.sh: #5170: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:57 PST 2012
ssl.sh: #5171: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:57 PST 2012
ssl.sh: #5172: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:57 PST 2012
ssl.sh: #5173: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:57 PST 2012
ssl.sh: #5174: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:57 PST 2012
ssl.sh: #5175: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:57 PST 2012
ssl.sh: #5176: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:58 PST 2012
ssl.sh: #5177: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:58 PST 2012
ssl.sh: #5178: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10225 >/dev/null 2>/dev/null
selfserv with PID 10225 found at Tue Nov 27 17:48:58 PST 2012
ssl.sh: #5179: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10225 at Tue Nov 27 17:48:58 PST 2012
kill -USR1 10225
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 10225 killed at Tue Nov 27 17:48:58 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:48:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:48:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:58 PST 2012
selfserv with PID 11636 started at Tue Nov 27 17:48:58 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:58 PST 2012
ssl.sh: #5180: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:58 PST 2012
ssl.sh: #5181: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:59 PST 2012
ssl.sh: #5182: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:59 PST 2012
ssl.sh: #5183: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:59 PST 2012
ssl.sh: #5184: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:59 PST 2012
ssl.sh: #5185: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:59 PST 2012
ssl.sh: #5186: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:48:59 PST 2012
ssl.sh: #5187: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:00 PST 2012
ssl.sh: #5188: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:00 PST 2012
ssl.sh: #5189: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:00 PST 2012
ssl.sh: #5190: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:00 PST 2012
ssl.sh: #5191: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:00 PST 2012
ssl.sh: #5192: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:00 PST 2012
================= CRL Reloaded =============
ssl.sh: #5193: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:01 PST 2012
ssl.sh: #5194: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:01 PST 2012
ssl.sh: #5195: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:01 PST 2012
ssl.sh: #5196: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:01 PST 2012
ssl.sh: #5197: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:01 PST 2012
ssl.sh: #5198: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:01 PST 2012
ssl.sh: #5199: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:02 PST 2012
ssl.sh: #5200: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:02 PST 2012
ssl.sh: #5201: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:02 PST 2012
ssl.sh: #5202: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:02 PST 2012
ssl.sh: #5203: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:02 PST 2012
ssl.sh: #5204: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:02 PST 2012
ssl.sh: #5205: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:03 PST 2012
ssl.sh: #5206: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:03 PST 2012
================= CRL Reloaded =============
ssl.sh: #5207: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:03 PST 2012
ssl.sh: #5208: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:03 PST 2012
ssl.sh: #5209: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:03 PST 2012
ssl.sh: #5210: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:03 PST 2012
ssl.sh: #5211: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:04 PST 2012
ssl.sh: #5212: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:04 PST 2012
ssl.sh: #5213: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:04 PST 2012
ssl.sh: #5214: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:04 PST 2012
ssl.sh: #5215: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:04 PST 2012
ssl.sh: #5216: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:04 PST 2012
ssl.sh: #5217: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:05 PST 2012
ssl.sh: #5218: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:05 PST 2012
ssl.sh: #5219: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 17:49:05 PST 2012
ssl.sh: #5220: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11636 at Tue Nov 27 17:49:05 PST 2012
kill -USR1 11636
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 11636 killed at Tue Nov 27 17:49:05 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:49:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 13047 >/dev/null 2>/dev/null
selfserv with PID 13047 found at Tue Nov 27 17:49:05 PST 2012
selfserv with PID 13047 started at Tue Nov 27 17:49:05 PST 2012
trying to kill selfserv with PID 13047 at Tue Nov 27 17:49:05 PST 2012
kill -USR1 13047
./ssl.sh: line 173: 13047 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 13047 killed at Tue Nov 27 17:49:05 PST 2012
selfserv starting at Tue Nov 27 17:49:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:05 PST 2012
selfserv with PID 13080 started at Tue Nov 27 17:49:05 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:05 PST 2012
ssl.sh: #5221: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5222: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5223: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5224: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5225: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5226: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5227: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:06 PST 2012
ssl.sh: #5228: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
ssl.sh: #5229: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
ssl.sh: #5230: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
ssl.sh: #5231: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
ssl.sh: #5232: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
ssl.sh: #5233: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
================= CRL Reloaded =============
ssl.sh: #5234: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:07 PST 2012
ssl.sh: #5235: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:08 PST 2012
ssl.sh: #5236: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:08 PST 2012
ssl.sh: #5237: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:08 PST 2012
ssl.sh: #5238: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:08 PST 2012
ssl.sh: #5239: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:08 PST 2012
ssl.sh: #5240: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:08 PST 2012
ssl.sh: #5241: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
ssl.sh: #5242: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
ssl.sh: #5243: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
ssl.sh: #5244: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
ssl.sh: #5245: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
ssl.sh: #5246: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
ssl.sh: #5247: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:09 PST 2012
================= CRL Reloaded =============
ssl.sh: #5248: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:10 PST 2012
ssl.sh: #5249: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:10 PST 2012
ssl.sh: #5250: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:10 PST 2012
ssl.sh: #5251: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:10 PST 2012
ssl.sh: #5252: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:10 PST 2012
ssl.sh: #5253: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:10 PST 2012
ssl.sh: #5254: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5255: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5256: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5257: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5258: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5259: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5260: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13080 >/dev/null 2>/dev/null
selfserv with PID 13080 found at Tue Nov 27 17:49:11 PST 2012
ssl.sh: #5261: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13080 at Tue Nov 27 17:49:11 PST 2012
kill -USR1 13080
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 13080 killed at Tue Nov 27 17:49:12 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:49:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
selfserv with PID 14491 started at Tue Nov 27 17:49:12 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
ssl.sh: #5262: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
ssl.sh: #5263: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
ssl.sh: #5264: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
ssl.sh: #5265: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
ssl.sh: #5266: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:12 PST 2012
ssl.sh: #5267: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:13 PST 2012
ssl.sh: #5268: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:13 PST 2012
ssl.sh: #5269: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:13 PST 2012
ssl.sh: #5270: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:13 PST 2012
ssl.sh: #5271: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:13 PST 2012
ssl.sh: #5272: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:13 PST 2012
ssl.sh: #5273: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
ssl.sh: #5274: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
================= CRL Reloaded =============
ssl.sh: #5275: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
ssl.sh: #5276: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
ssl.sh: #5277: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
ssl.sh: #5278: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
ssl.sh: #5279: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:14 PST 2012
ssl.sh: #5280: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:15 PST 2012
ssl.sh: #5281: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:15 PST 2012
ssl.sh: #5282: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:15 PST 2012
ssl.sh: #5283: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:15 PST 2012
ssl.sh: #5284: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
ssl.sh: #5285: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
ssl.sh: #5286: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
ssl.sh: #5287: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
ssl.sh: #5288: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
================= CRL Reloaded =============
ssl.sh: #5289: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
ssl.sh: #5290: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:16 PST 2012
ssl.sh: #5291: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5292: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5293: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5294: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5295: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5296: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5297: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:17 PST 2012
ssl.sh: #5298: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:18 PST 2012
ssl.sh: #5299: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:18 PST 2012
ssl.sh: #5300: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:18 PST 2012
ssl.sh: #5301: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14491 >/dev/null 2>/dev/null
selfserv with PID 14491 found at Tue Nov 27 17:49:18 PST 2012
ssl.sh: #5302: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14491 at Tue Nov 27 17:49:18 PST 2012
kill -USR1 14491
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 14491 killed at Tue Nov 27 17:49:18 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:49:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:18 PST 2012
selfserv with PID 15904 started at Tue Nov 27 17:49:18 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:18 PST 2012
ssl.sh: #5303: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5304: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5305: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5306: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5307: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5308: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5309: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:19 PST 2012
ssl.sh: #5310: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
ssl.sh: #5311: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
ssl.sh: #5312: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
ssl.sh: #5313: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
ssl.sh: #5314: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
ssl.sh: #5315: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
================= CRL Reloaded =============
ssl.sh: #5316: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:20 PST 2012
ssl.sh: #5317: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:21 PST 2012
ssl.sh: #5318: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:21 PST 2012
ssl.sh: #5319: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:21 PST 2012
ssl.sh: #5320: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:21 PST 2012
ssl.sh: #5321: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:21 PST 2012
ssl.sh: #5322: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:21 PST 2012
ssl.sh: #5323: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
ssl.sh: #5324: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
ssl.sh: #5325: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
ssl.sh: #5326: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
ssl.sh: #5327: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
ssl.sh: #5328: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
ssl.sh: #5329: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 169 bytes
tstclnt: Writing 169 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:22 PST 2012
================= CRL Reloaded =============
ssl.sh: #5330: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:23 PST 2012
ssl.sh: #5331: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:23 PST 2012
ssl.sh: #5332: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:23 PST 2012
ssl.sh: #5333: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:23 PST 2012
ssl.sh: #5334: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:23 PST 2012
ssl.sh: #5335: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:23 PST 2012
ssl.sh: #5336: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5337: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5338: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5339: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5340: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5341: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5342: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15904 >/dev/null 2>/dev/null
selfserv with PID 15904 found at Tue Nov 27 17:49:24 PST 2012
ssl.sh: #5343: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15904 at Tue Nov 27 17:49:24 PST 2012
kill -USR1 15904
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 15904 killed at Tue Nov 27 17:49:24 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:49:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:25 PST 2012
selfserv with PID 17315 started at Tue Nov 27 17:49:25 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:25 PST 2012
ssl.sh: #5344: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:25 PST 2012
ssl.sh: #5345: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:25 PST 2012
ssl.sh: #5346: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:25 PST 2012
ssl.sh: #5347: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:25 PST 2012
ssl.sh: #5348: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:26 PST 2012
ssl.sh: #5349: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:26 PST 2012
ssl.sh: #5350: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:26 PST 2012
ssl.sh: #5351: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:26 PST 2012
ssl.sh: #5352: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:26 PST 2012
ssl.sh: #5353: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:26 PST 2012
ssl.sh: #5354: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:27 PST 2012
ssl.sh: #5355: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:27 PST 2012
ssl.sh: #5356: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:27 PST 2012
================= CRL Reloaded =============
ssl.sh: #5357: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:27 PST 2012
ssl.sh: #5358: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:27 PST 2012
ssl.sh: #5359: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:27 PST 2012
ssl.sh: #5360: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:28 PST 2012
ssl.sh: #5361: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:28 PST 2012
ssl.sh: #5362: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:28 PST 2012
ssl.sh: #5363: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:28 PST 2012
ssl.sh: #5364: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:28 PST 2012
ssl.sh: #5365: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:28 PST 2012
ssl.sh: #5366: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:29 PST 2012
ssl.sh: #5367: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:29 PST 2012
ssl.sh: #5368: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:29 PST 2012
ssl.sh: #5369: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:29 PST 2012
ssl.sh: #5370: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:29 PST 2012
================= CRL Reloaded =============
ssl.sh: #5371: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5372: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5373: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5374: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5375: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5376: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5377: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:30 PST 2012
ssl.sh: #5378: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:31 PST 2012
ssl.sh: #5379: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:31 PST 2012
ssl.sh: #5380: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:31 PST 2012
ssl.sh: #5381: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:31 PST 2012
ssl.sh: #5382: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:31 PST 2012
ssl.sh: #5383: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17315 >/dev/null 2>/dev/null
selfserv with PID 17315 found at Tue Nov 27 17:49:32 PST 2012
ssl.sh: #5384: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17315 at Tue Nov 27 17:49:32 PST 2012
kill -USR1 17315
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17315 killed at Tue Nov 27 17:49:32 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:49:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:32 PST 2012
selfserv with PID 18726 started at Tue Nov 27 17:49:32 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:32 PST 2012
ssl.sh: #5385: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:32 PST 2012
ssl.sh: #5386: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:32 PST 2012
ssl.sh: #5387: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:32 PST 2012
ssl.sh: #5388: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:32 PST 2012
ssl.sh: #5389: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:33 PST 2012
ssl.sh: #5390: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:33 PST 2012
ssl.sh: #5391: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:33 PST 2012
ssl.sh: #5392: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:33 PST 2012
ssl.sh: #5393: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:33 PST 2012
ssl.sh: #5394: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:34 PST 2012
ssl.sh: #5395: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:34 PST 2012
ssl.sh: #5396: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:34 PST 2012
ssl.sh: #5397: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:34 PST 2012
================= CRL Reloaded =============
ssl.sh: #5398: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:34 PST 2012
ssl.sh: #5399: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:34 PST 2012
ssl.sh: #5400: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:35 PST 2012
ssl.sh: #5401: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:35 PST 2012
ssl.sh: #5402: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:35 PST 2012
ssl.sh: #5403: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:35 PST 2012
ssl.sh: #5404: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:35 PST 2012
ssl.sh: #5405: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:35 PST 2012
ssl.sh: #5406: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:36 PST 2012
ssl.sh: #5407: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:36 PST 2012
ssl.sh: #5408: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:36 PST 2012
ssl.sh: #5409: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:36 PST 2012
ssl.sh: #5410: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:36 PST 2012
ssl.sh: #5411: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:36 PST 2012
================= CRL Reloaded =============
ssl.sh: #5412: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:37 PST 2012
ssl.sh: #5413: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:37 PST 2012
ssl.sh: #5414: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:37 PST 2012
ssl.sh: #5415: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:37 PST 2012
ssl.sh: #5416: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:37 PST 2012
ssl.sh: #5417: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:37 PST 2012
ssl.sh: #5418: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:38 PST 2012
ssl.sh: #5419: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:38 PST 2012
ssl.sh: #5420: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:38 PST 2012
ssl.sh: #5421: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:38 PST 2012
ssl.sh: #5422: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:38 PST 2012
ssl.sh: #5423: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:38 PST 2012
ssl.sh: #5424: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18726 >/dev/null 2>/dev/null
selfserv with PID 18726 found at Tue Nov 27 17:49:39 PST 2012
ssl.sh: #5425: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18726 at Tue Nov 27 17:49:39 PST 2012
kill -USR1 18726
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18726 killed at Tue Nov 27 17:49:39 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:49:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:39 PST 2012
selfserv with PID 20137 started at Tue Nov 27 17:49:39 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:39 PST 2012
ssl.sh: #5426: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:39 PST 2012
ssl.sh: #5427: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:39 PST 2012
ssl.sh: #5428: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:39 PST 2012
ssl.sh: #5429: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:40 PST 2012
ssl.sh: #5430: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:40 PST 2012
ssl.sh: #5431: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:40 PST 2012
ssl.sh: #5432: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:40 PST 2012
ssl.sh: #5433: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:40 PST 2012
ssl.sh: #5434: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:40 PST 2012
ssl.sh: #5435: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:41 PST 2012
ssl.sh: #5436: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:41 PST 2012
ssl.sh: #5437: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:41 PST 2012
ssl.sh: #5438: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:41 PST 2012
================= CRL Reloaded =============
ssl.sh: #5439: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:41 PST 2012
ssl.sh: #5440: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:41 PST 2012
ssl.sh: #5441: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:42 PST 2012
ssl.sh: #5442: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:42 PST 2012
ssl.sh: #5443: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:42 PST 2012
ssl.sh: #5444: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:42 PST 2012
ssl.sh: #5445: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:42 PST 2012
ssl.sh: #5446: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:42 PST 2012
ssl.sh: #5447: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:43 PST 2012
ssl.sh: #5448: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:43 PST 2012
ssl.sh: #5449: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:43 PST 2012
ssl.sh: #5450: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:43 PST 2012
ssl.sh: #5451: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:43 PST 2012
ssl.sh: #5452: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:43 PST 2012
================= CRL Reloaded =============
ssl.sh: #5453: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:44 PST 2012
ssl.sh: #5454: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:44 PST 2012
ssl.sh: #5455: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:44 PST 2012
ssl.sh: #5456: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:44 PST 2012
ssl.sh: #5457: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:44 PST 2012
ssl.sh: #5458: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:44 PST 2012
ssl.sh: #5459: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:45 PST 2012
ssl.sh: #5460: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:45 PST 2012
ssl.sh: #5461: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:45 PST 2012
ssl.sh: #5462: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:45 PST 2012
ssl.sh: #5463: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:46 PST 2012
ssl.sh: #5464: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:46 PST 2012
ssl.sh: #5465: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20137 >/dev/null 2>/dev/null
selfserv with PID 20137 found at Tue Nov 27 17:49:46 PST 2012
ssl.sh: #5466: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20137 at Tue Nov 27 17:49:46 PST 2012
kill -USR1 20137
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20137 killed at Tue Nov 27 17:49:46 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:49:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21558 >/dev/null 2>/dev/null
selfserv with PID 21558 found at Tue Nov 27 17:49:46 PST 2012
selfserv with PID 21558 started at Tue Nov 27 17:49:46 PST 2012
trying to kill selfserv with PID 21558 at Tue Nov 27 17:49:46 PST 2012
kill -USR1 21558
./ssl.sh: line 173: 21558 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 21558 killed at Tue Nov 27 17:49:46 PST 2012
ssl.sh: SSL Cipher Coverage  - server bypass/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 17:49:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:46 PST 2012
selfserv with PID 21597 started at Tue Nov 27 17:49:46 PST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5467: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c B -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5468: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c C -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5469: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5470: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c E -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5471: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5472: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5473: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5474: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5475: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5476: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5477: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5478: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5479: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5480: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5481: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5482: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5483: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5484: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5485: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5486: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5487: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5488: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5489: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5490: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5491: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5492: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5493: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5494: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5495: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5496: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5497: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5498: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5499: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5500: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5501: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5502: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5503: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5504: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5505: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5506: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5507: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5508: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5509: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5510: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5511: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5512: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5513: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5514: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5515: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5516: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5517: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5518: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5519: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5520: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5521: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5522: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5523: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5524: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21597 >/dev/null 2>/dev/null
selfserv with PID 21597 found at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5525: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21597 at Tue Nov 27 17:49:54 PST 2012
kill -USR1 21597
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21597 killed at Tue Nov 27 17:49:54 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:49:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23182 >/dev/null 2>/dev/null
selfserv with PID 23182 found at Tue Nov 27 17:49:54 PST 2012
selfserv with PID 23182 started at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5526: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23182 >/dev/null 2>/dev/null
selfserv with PID 23182 found at Tue Nov 27 17:49:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5527: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23182 >/dev/null 2>/dev/null
selfserv with PID 23182 found at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5528: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23182 >/dev/null 2>/dev/null
selfserv with PID 23182 found at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5529: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23182 >/dev/null 2>/dev/null
selfserv with PID 23182 found at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5530: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23182 at Tue Nov 27 17:49:55 PST 2012
kill -USR1 23182
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23182 killed at Tue Nov 27 17:49:55 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:49:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:55 PST 2012
selfserv with PID 23321 started at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5531: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5532: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5533: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5534: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5535: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5536: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5537: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5538: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5539: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5540: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5541: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5542: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5543: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5544: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5545: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23321 at Tue Nov 27 17:49:57 PST 2012
kill -USR1 23321
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23321 killed at Tue Nov 27 17:49:57 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:49:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23711 >/dev/null 2>/dev/null
selfserv with PID 23711 found at Tue Nov 27 17:49:57 PST 2012
selfserv with PID 23711 started at Tue Nov 27 17:49:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5546: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23711 >/dev/null 2>/dev/null
selfserv with PID 23711 found at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5547: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23711 >/dev/null 2>/dev/null
selfserv with PID 23711 found at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5548: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23711 >/dev/null 2>/dev/null
selfserv with PID 23711 found at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5549: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23711 >/dev/null 2>/dev/null
selfserv with PID 23711 found at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5550: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23711 at Tue Nov 27 17:49:58 PST 2012
kill -USR1 23711
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23711 killed at Tue Nov 27 17:49:58 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:49:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:58 PST 2012
selfserv with PID 23850 started at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5551: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5552: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5553: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5554: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5555: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5556: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5557: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5558: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:49:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5559: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:50:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5560: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:50:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5561: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:50:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5562: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:50:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5563: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:50:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5564: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23850 >/dev/null 2>/dev/null
selfserv with PID 23850 found at Tue Nov 27 17:50:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5565: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23850 at Tue Nov 27 17:50:01 PST 2012
kill -USR1 23850
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 23850 killed at Tue Nov 27 17:50:01 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:50:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24226 >/dev/null 2>/dev/null
selfserv with PID 24226 found at Tue Nov 27 17:50:01 PST 2012
selfserv with PID 24226 started at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5566: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24226 >/dev/null 2>/dev/null
selfserv with PID 24226 found at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5567: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24226 >/dev/null 2>/dev/null
selfserv with PID 24226 found at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5568: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24226 >/dev/null 2>/dev/null
selfserv with PID 24226 found at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5569: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24226 >/dev/null 2>/dev/null
selfserv with PID 24226 found at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5570: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24226 at Tue Nov 27 17:50:01 PST 2012
kill -USR1 24226
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24226 killed at Tue Nov 27 17:50:01 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:50:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24365 >/dev/null 2>/dev/null
selfserv with PID 24365 found at Tue Nov 27 17:50:01 PST 2012
selfserv with PID 24365 started at Tue Nov 27 17:50:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5571: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24365 >/dev/null 2>/dev/null
selfserv with PID 24365 found at Tue Nov 27 17:50:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5572: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24365 >/dev/null 2>/dev/null
selfserv with PID 24365 found at Tue Nov 27 17:50:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5573: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24365 >/dev/null 2>/dev/null
selfserv with PID 24365 found at Tue Nov 27 17:50:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5574: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24365 >/dev/null 2>/dev/null
selfserv with PID 24365 found at Tue Nov 27 17:50:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5575: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24365 at Tue Nov 27 17:50:02 PST 2012
kill -USR1 24365
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24365 killed at Tue Nov 27 17:50:02 PST 2012
ssl.sh: SSL Client Authentication  - server bypass/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24555 >/dev/null 2>/dev/null
selfserv with PID 24555 found at Tue Nov 27 17:50:02 PST 2012
selfserv with PID 24555 started at Tue Nov 27 17:50:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5576: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24555 at Tue Nov 27 17:50:02 PST 2012
kill -USR1 24555
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24555 killed at Tue Nov 27 17:50:02 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:50:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24603 >/dev/null 2>/dev/null
selfserv with PID 24603 found at Tue Nov 27 17:50:03 PST 2012
selfserv with PID 24603 started at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5577: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24603 at Tue Nov 27 17:50:03 PST 2012
kill -USR1 24603
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24603 killed at Tue Nov 27 17:50:03 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:50:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24651 >/dev/null 2>/dev/null
selfserv with PID 24651 found at Tue Nov 27 17:50:03 PST 2012
selfserv with PID 24651 started at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5578: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24651 at Tue Nov 27 17:50:03 PST 2012
kill -USR1 24651
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24651 killed at Tue Nov 27 17:50:03 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24699 >/dev/null 2>/dev/null
selfserv with PID 24699 found at Tue Nov 27 17:50:03 PST 2012
selfserv with PID 24699 started at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5579: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24699 at Tue Nov 27 17:50:03 PST 2012
kill -USR1 24699
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24699 killed at Tue Nov 27 17:50:03 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:50:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24747 >/dev/null 2>/dev/null
selfserv with PID 24747 found at Tue Nov 27 17:50:03 PST 2012
selfserv with PID 24747 started at Tue Nov 27 17:50:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5580: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24747 at Tue Nov 27 17:50:03 PST 2012
kill -USR1 24747
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24747 killed at Tue Nov 27 17:50:03 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:50:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24795 >/dev/null 2>/dev/null
selfserv with PID 24795 found at Tue Nov 27 17:50:04 PST 2012
selfserv with PID 24795 started at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5581: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24795 at Tue Nov 27 17:50:04 PST 2012
kill -USR1 24795
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24795 killed at Tue Nov 27 17:50:04 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24843 >/dev/null 2>/dev/null
selfserv with PID 24843 found at Tue Nov 27 17:50:04 PST 2012
selfserv with PID 24843 started at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5582: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24843 at Tue Nov 27 17:50:04 PST 2012
kill -USR1 24843
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24843 killed at Tue Nov 27 17:50:04 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:50:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24891 >/dev/null 2>/dev/null
selfserv with PID 24891 found at Tue Nov 27 17:50:04 PST 2012
selfserv with PID 24891 started at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5583: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24891 at Tue Nov 27 17:50:04 PST 2012
kill -USR1 24891
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24891 killed at Tue Nov 27 17:50:04 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:50:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24939 >/dev/null 2>/dev/null
selfserv with PID 24939 found at Tue Nov 27 17:50:04 PST 2012
selfserv with PID 24939 started at Tue Nov 27 17:50:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5584: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24939 at Tue Nov 27 17:50:04 PST 2012
kill -USR1 24939
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24939 killed at Tue Nov 27 17:50:04 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24987 >/dev/null 2>/dev/null
selfserv with PID 24987 found at Tue Nov 27 17:50:05 PST 2012
selfserv with PID 24987 started at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5585: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24987 at Tue Nov 27 17:50:05 PST 2012
kill -USR1 24987
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24987 killed at Tue Nov 27 17:50:05 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:50:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25035 >/dev/null 2>/dev/null
selfserv with PID 25035 found at Tue Nov 27 17:50:05 PST 2012
selfserv with PID 25035 started at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5586: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25035 at Tue Nov 27 17:50:05 PST 2012
kill -USR1 25035
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25035 killed at Tue Nov 27 17:50:05 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:50:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25083 >/dev/null 2>/dev/null
selfserv with PID 25083 found at Tue Nov 27 17:50:05 PST 2012
selfserv with PID 25083 started at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5587: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25083 at Tue Nov 27 17:50:05 PST 2012
kill -USR1 25083
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25083 killed at Tue Nov 27 17:50:05 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25131 >/dev/null 2>/dev/null
selfserv with PID 25131 found at Tue Nov 27 17:50:05 PST 2012
selfserv with PID 25131 started at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5588: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25131 at Tue Nov 27 17:50:05 PST 2012
kill -USR1 25131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25131 killed at Tue Nov 27 17:50:05 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:50:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25179 >/dev/null 2>/dev/null
selfserv with PID 25179 found at Tue Nov 27 17:50:06 PST 2012
selfserv with PID 25179 started at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5589: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25179 at Tue Nov 27 17:50:06 PST 2012
kill -USR1 25179
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25179 killed at Tue Nov 27 17:50:06 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:50:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25227 >/dev/null 2>/dev/null
selfserv with PID 25227 found at Tue Nov 27 17:50:06 PST 2012
selfserv with PID 25227 started at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5590: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25227 at Tue Nov 27 17:50:06 PST 2012
kill -USR1 25227
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25227 killed at Tue Nov 27 17:50:06 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25275 >/dev/null 2>/dev/null
selfserv with PID 25275 found at Tue Nov 27 17:50:06 PST 2012
selfserv with PID 25275 started at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5591: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25275 at Tue Nov 27 17:50:06 PST 2012
kill -USR1 25275
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25275 killed at Tue Nov 27 17:50:06 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:50:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25323 >/dev/null 2>/dev/null
selfserv with PID 25323 found at Tue Nov 27 17:50:06 PST 2012
selfserv with PID 25323 started at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5592: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25323 at Tue Nov 27 17:50:06 PST 2012
kill -USR1 25323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25323 killed at Tue Nov 27 17:50:06 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:50:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25371 >/dev/null 2>/dev/null
selfserv with PID 25371 found at Tue Nov 27 17:50:06 PST 2012
selfserv with PID 25371 started at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5593: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25371 at Tue Nov 27 17:50:07 PST 2012
kill -USR1 25371
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25371 killed at Tue Nov 27 17:50:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25419 >/dev/null 2>/dev/null
selfserv with PID 25419 found at Tue Nov 27 17:50:07 PST 2012
selfserv with PID 25419 started at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5594: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25419 at Tue Nov 27 17:50:07 PST 2012
kill -USR1 25419
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25419 killed at Tue Nov 27 17:50:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:50:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25467 >/dev/null 2>/dev/null
selfserv with PID 25467 found at Tue Nov 27 17:50:07 PST 2012
selfserv with PID 25467 started at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5595: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25467 at Tue Nov 27 17:50:07 PST 2012
kill -USR1 25467
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25467 killed at Tue Nov 27 17:50:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:50:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25515 >/dev/null 2>/dev/null
selfserv with PID 25515 found at Tue Nov 27 17:50:07 PST 2012
selfserv with PID 25515 started at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5596: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25515 at Tue Nov 27 17:50:07 PST 2012
kill -USR1 25515
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25515 killed at Tue Nov 27 17:50:07 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25563 >/dev/null 2>/dev/null
selfserv with PID 25563 found at Tue Nov 27 17:50:08 PST 2012
selfserv with PID 25563 started at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5597: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25563 at Tue Nov 27 17:50:08 PST 2012
kill -USR1 25563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25563 killed at Tue Nov 27 17:50:08 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:50:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25611 >/dev/null 2>/dev/null
selfserv with PID 25611 found at Tue Nov 27 17:50:08 PST 2012
selfserv with PID 25611 started at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5598: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25611 at Tue Nov 27 17:50:08 PST 2012
kill -USR1 25611
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25611 killed at Tue Nov 27 17:50:08 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:50:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25659 >/dev/null 2>/dev/null
selfserv with PID 25659 found at Tue Nov 27 17:50:08 PST 2012
selfserv with PID 25659 started at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5599: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25659 at Tue Nov 27 17:50:08 PST 2012
kill -USR1 25659
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25659 killed at Tue Nov 27 17:50:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25707 >/dev/null 2>/dev/null
selfserv with PID 25707 found at Tue Nov 27 17:50:08 PST 2012
selfserv with PID 25707 started at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5600: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25707 at Tue Nov 27 17:50:08 PST 2012
kill -USR1 25707
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25707 killed at Tue Nov 27 17:50:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:50:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25755 >/dev/null 2>/dev/null
selfserv with PID 25755 found at Tue Nov 27 17:50:09 PST 2012
selfserv with PID 25755 started at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5601: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25755 at Tue Nov 27 17:50:09 PST 2012
kill -USR1 25755
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25755 killed at Tue Nov 27 17:50:09 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:50:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25803 >/dev/null 2>/dev/null
selfserv with PID 25803 found at Tue Nov 27 17:50:09 PST 2012
selfserv with PID 25803 started at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5602: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25803 at Tue Nov 27 17:50:09 PST 2012
kill -USR1 25803
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25803 killed at Tue Nov 27 17:50:09 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:50:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25851 >/dev/null 2>/dev/null
selfserv with PID 25851 found at Tue Nov 27 17:50:09 PST 2012
selfserv with PID 25851 started at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5603: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25851 at Tue Nov 27 17:50:09 PST 2012
kill -USR1 25851
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25851 killed at Tue Nov 27 17:50:09 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:50:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25899 >/dev/null 2>/dev/null
selfserv with PID 25899 found at Tue Nov 27 17:50:09 PST 2012
selfserv with PID 25899 started at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5604: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25899 at Tue Nov 27 17:50:09 PST 2012
kill -USR1 25899
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25899 killed at Tue Nov 27 17:50:09 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:50:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25947 >/dev/null 2>/dev/null
selfserv with PID 25947 found at Tue Nov 27 17:50:10 PST 2012
selfserv with PID 25947 started at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5605: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25947 at Tue Nov 27 17:50:10 PST 2012
kill -USR1 25947
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25947 killed at Tue Nov 27 17:50:10 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26010 >/dev/null 2>/dev/null
selfserv with PID 26010 found at Tue Nov 27 17:50:10 PST 2012
selfserv with PID 26010 started at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5606: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26010 at Tue Nov 27 17:50:10 PST 2012
kill -USR1 26010
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26010 killed at Tue Nov 27 17:50:10 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26058 >/dev/null 2>/dev/null
selfserv with PID 26058 found at Tue Nov 27 17:50:10 PST 2012
selfserv with PID 26058 started at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5607: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26058 at Tue Nov 27 17:50:10 PST 2012
kill -USR1 26058
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26058 killed at Tue Nov 27 17:50:10 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26106 >/dev/null 2>/dev/null
selfserv with PID 26106 found at Tue Nov 27 17:50:10 PST 2012
selfserv with PID 26106 started at Tue Nov 27 17:50:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5608: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26106 at Tue Nov 27 17:50:11 PST 2012
kill -USR1 26106
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26106 killed at Tue Nov 27 17:50:11 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26154 >/dev/null 2>/dev/null
selfserv with PID 26154 found at Tue Nov 27 17:50:11 PST 2012
selfserv with PID 26154 started at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5609: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26154 at Tue Nov 27 17:50:11 PST 2012
kill -USR1 26154
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26154 killed at Tue Nov 27 17:50:11 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26202 >/dev/null 2>/dev/null
selfserv with PID 26202 found at Tue Nov 27 17:50:11 PST 2012
selfserv with PID 26202 started at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5610: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26202 at Tue Nov 27 17:50:11 PST 2012
kill -USR1 26202
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26202 killed at Tue Nov 27 17:50:11 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26250 >/dev/null 2>/dev/null
selfserv with PID 26250 found at Tue Nov 27 17:50:11 PST 2012
selfserv with PID 26250 started at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5611: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26250 at Tue Nov 27 17:50:11 PST 2012
kill -USR1 26250
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26250 killed at Tue Nov 27 17:50:11 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26298 >/dev/null 2>/dev/null
selfserv with PID 26298 found at Tue Nov 27 17:50:11 PST 2012
selfserv with PID 26298 started at Tue Nov 27 17:50:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5612: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26298 at Tue Nov 27 17:50:12 PST 2012
kill -USR1 26298
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26298 killed at Tue Nov 27 17:50:12 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26346 >/dev/null 2>/dev/null
selfserv with PID 26346 found at Tue Nov 27 17:50:12 PST 2012
selfserv with PID 26346 started at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5613: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26346 at Tue Nov 27 17:50:12 PST 2012
kill -USR1 26346
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26346 killed at Tue Nov 27 17:50:12 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26394 >/dev/null 2>/dev/null
selfserv with PID 26394 found at Tue Nov 27 17:50:12 PST 2012
selfserv with PID 26394 started at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5614: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26394 at Tue Nov 27 17:50:12 PST 2012
kill -USR1 26394
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26394 killed at Tue Nov 27 17:50:12 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26442 >/dev/null 2>/dev/null
selfserv with PID 26442 found at Tue Nov 27 17:50:12 PST 2012
selfserv with PID 26442 started at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5615: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26442 at Tue Nov 27 17:50:12 PST 2012
kill -USR1 26442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26442 killed at Tue Nov 27 17:50:12 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26490 >/dev/null 2>/dev/null
selfserv with PID 26490 found at Tue Nov 27 17:50:12 PST 2012
selfserv with PID 26490 started at Tue Nov 27 17:50:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5616: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26490 at Tue Nov 27 17:50:13 PST 2012
kill -USR1 26490
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26490 killed at Tue Nov 27 17:50:13 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26538 >/dev/null 2>/dev/null
selfserv with PID 26538 found at Tue Nov 27 17:50:13 PST 2012
selfserv with PID 26538 started at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5617: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26538 at Tue Nov 27 17:50:13 PST 2012
kill -USR1 26538
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26538 killed at Tue Nov 27 17:50:13 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26586 >/dev/null 2>/dev/null
selfserv with PID 26586 found at Tue Nov 27 17:50:13 PST 2012
selfserv with PID 26586 started at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5618: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26586 at Tue Nov 27 17:50:13 PST 2012
kill -USR1 26586
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26586 killed at Tue Nov 27 17:50:13 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26634 >/dev/null 2>/dev/null
selfserv with PID 26634 found at Tue Nov 27 17:50:13 PST 2012
selfserv with PID 26634 started at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5619: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26634 at Tue Nov 27 17:50:13 PST 2012
kill -USR1 26634
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26634 killed at Tue Nov 27 17:50:13 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26682 >/dev/null 2>/dev/null
selfserv with PID 26682 found at Tue Nov 27 17:50:14 PST 2012
selfserv with PID 26682 started at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5620: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26682 at Tue Nov 27 17:50:14 PST 2012
kill -USR1 26682
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26682 killed at Tue Nov 27 17:50:14 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26730 >/dev/null 2>/dev/null
selfserv with PID 26730 found at Tue Nov 27 17:50:14 PST 2012
selfserv with PID 26730 started at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5621: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26730 at Tue Nov 27 17:50:14 PST 2012
kill -USR1 26730
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26730 killed at Tue Nov 27 17:50:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26778 >/dev/null 2>/dev/null
selfserv with PID 26778 found at Tue Nov 27 17:50:14 PST 2012
selfserv with PID 26778 started at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5622: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26778 at Tue Nov 27 17:50:14 PST 2012
kill -USR1 26778
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26778 killed at Tue Nov 27 17:50:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26826 >/dev/null 2>/dev/null
selfserv with PID 26826 found at Tue Nov 27 17:50:14 PST 2012
selfserv with PID 26826 started at Tue Nov 27 17:50:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5623: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26826 at Tue Nov 27 17:50:14 PST 2012
kill -USR1 26826
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26826 killed at Tue Nov 27 17:50:14 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:50:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26874 >/dev/null 2>/dev/null
selfserv with PID 26874 found at Tue Nov 27 17:50:15 PST 2012
selfserv with PID 26874 started at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5624: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26874 at Tue Nov 27 17:50:15 PST 2012
kill -USR1 26874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26874 killed at Tue Nov 27 17:50:15 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:50:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26922 >/dev/null 2>/dev/null
selfserv with PID 26922 found at Tue Nov 27 17:50:15 PST 2012
selfserv with PID 26922 started at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5625: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26922 at Tue Nov 27 17:50:15 PST 2012
kill -USR1 26922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26922 killed at Tue Nov 27 17:50:15 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:50:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 26991 >/dev/null 2>/dev/null
selfserv with PID 26991 found at Tue Nov 27 17:50:15 PST 2012
selfserv with PID 26991 started at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5626: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26991 at Tue Nov 27 17:50:15 PST 2012
kill -USR1 26991
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 26991 killed at Tue Nov 27 17:50:15 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:50:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27045 >/dev/null 2>/dev/null
selfserv with PID 27045 found at Tue Nov 27 17:50:15 PST 2012
selfserv with PID 27045 started at Tue Nov 27 17:50:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5627: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27045 at Tue Nov 27 17:50:16 PST 2012
kill -USR1 27045
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27045 killed at Tue Nov 27 17:50:16 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:50:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27099 >/dev/null 2>/dev/null
selfserv with PID 27099 found at Tue Nov 27 17:50:16 PST 2012
selfserv with PID 27099 started at Tue Nov 27 17:50:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #5628: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27099 at Tue Nov 27 17:50:16 PST 2012
kill -USR1 27099
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27099 killed at Tue Nov 27 17:50:16 PST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:50:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27153 >/dev/null 2>/dev/null
selfserv with PID 27153 found at Tue Nov 27 17:50:16 PST 2012
selfserv with PID 27153 started at Tue Nov 27 17:50:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5629: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27153 at Tue Nov 27 17:50:16 PST 2012
kill -USR1 27153
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27153 killed at Tue Nov 27 17:50:16 PST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 17:50:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27208 >/dev/null 2>/dev/null
selfserv with PID 27208 found at Tue Nov 27 17:50:17 PST 2012
selfserv with PID 27208 started at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #5630: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27208 at Tue Nov 27 17:50:17 PST 2012
kill -USR1 27208
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27208 killed at Tue Nov 27 17:50:17 PST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 17:50:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27263 >/dev/null 2>/dev/null
selfserv with PID 27263 found at Tue Nov 27 17:50:17 PST 2012
selfserv with PID 27263 started at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5631: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27263 at Tue Nov 27 17:50:17 PST 2012
kill -USR1 27263
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27263 killed at Tue Nov 27 17:50:17 PST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 17:50:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27317 >/dev/null 2>/dev/null
selfserv with PID 27317 found at Tue Nov 27 17:50:17 PST 2012
selfserv with PID 27317 started at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5632: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27317 at Tue Nov 27 17:50:17 PST 2012
kill -USR1 27317
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27317 killed at Tue Nov 27 17:50:17 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 17:50:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27371 >/dev/null 2>/dev/null
selfserv with PID 27371 found at Tue Nov 27 17:50:17 PST 2012
selfserv with PID 27371 started at Tue Nov 27 17:50:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #5633: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27371 at Tue Nov 27 17:50:17 PST 2012
kill -USR1 27371
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27371 killed at Tue Nov 27 17:50:17 PST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 17:50:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27425 >/dev/null 2>/dev/null
selfserv with PID 27425 found at Tue Nov 27 17:50:18 PST 2012
selfserv with PID 27425 started at Tue Nov 27 17:50:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com,E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #5634: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27425 at Tue Nov 27 17:50:18 PST 2012
kill -USR1 27425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27425 killed at Tue Nov 27 17:50:18 PST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 17:50:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27479 >/dev/null 2>/dev/null
selfserv with PID 27479 found at Tue Nov 27 17:50:18 PST 2012
selfserv with PID 27479 started at Tue Nov 27 17:50:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a nss-vm-darwin9-1-sni1.community.scl3.mozilla.com  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #5635: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27479 at Tue Nov 27 17:50:18 PST 2012
kill -USR1 27479
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27479 killed at Tue Nov 27 17:50:18 PST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:50:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27602 >/dev/null 2>/dev/null
selfserv with PID 27602 found at Tue Nov 27 17:50:18 PST 2012
selfserv with PID 27602 started at Tue Nov 27 17:50:18 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:19 PST 2012
ssl.sh: #5636: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27602 at Tue Nov 27 17:50:19 PST 2012
kill -USR1 27602
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27602 killed at Tue Nov 27 17:50:19 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:50:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27660 >/dev/null 2>/dev/null
selfserv with PID 27660 found at Tue Nov 27 17:50:19 PST 2012
selfserv with PID 27660 started at Tue Nov 27 17:50:19 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:20 PST 2012
ssl.sh: #5637: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27660 at Tue Nov 27 17:50:20 PST 2012
kill -USR1 27660
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27660 killed at Tue Nov 27 17:50:20 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:50:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27718 >/dev/null 2>/dev/null
selfserv with PID 27718 found at Tue Nov 27 17:50:20 PST 2012
selfserv with PID 27718 started at Tue Nov 27 17:50:20 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:21 PST 2012
ssl.sh: #5638: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27718 at Tue Nov 27 17:50:21 PST 2012
kill -USR1 27718
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27718 killed at Tue Nov 27 17:50:21 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:50:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27776 >/dev/null 2>/dev/null
selfserv with PID 27776 found at Tue Nov 27 17:50:21 PST 2012
selfserv with PID 27776 started at Tue Nov 27 17:50:21 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:21 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:22 PST 2012
ssl.sh: #5639: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27776 at Tue Nov 27 17:50:22 PST 2012
kill -USR1 27776
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27776 killed at Tue Nov 27 17:50:22 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:50:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27834 >/dev/null 2>/dev/null
selfserv with PID 27834 found at Tue Nov 27 17:50:22 PST 2012
selfserv with PID 27834 started at Tue Nov 27 17:50:22 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:22 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:23 PST 2012
ssl.sh: #5640: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27834 at Tue Nov 27 17:50:23 PST 2012
kill -USR1 27834
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27834 killed at Tue Nov 27 17:50:23 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:50:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27892 >/dev/null 2>/dev/null
selfserv with PID 27892 found at Tue Nov 27 17:50:23 PST 2012
selfserv with PID 27892 started at Tue Nov 27 17:50:23 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:23 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:24 PST 2012
ssl.sh: #5641: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27892 at Tue Nov 27 17:50:24 PST 2012
kill -USR1 27892
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27892 killed at Tue Nov 27 17:50:24 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:50:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27950 >/dev/null 2>/dev/null
selfserv with PID 27950 found at Tue Nov 27 17:50:24 PST 2012
selfserv with PID 27950 started at Tue Nov 27 17:50:24 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:24 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:25 PST 2012
ssl.sh: #5642: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27950 at Tue Nov 27 17:50:25 PST 2012
kill -USR1 27950
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27950 killed at Tue Nov 27 17:50:25 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:50:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28008 >/dev/null 2>/dev/null
selfserv with PID 28008 found at Tue Nov 27 17:50:25 PST 2012
selfserv with PID 28008 started at Tue Nov 27 17:50:25 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:25 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:26 PST 2012
ssl.sh: #5643: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28008 at Tue Nov 27 17:50:26 PST 2012
kill -USR1 28008
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28008 killed at Tue Nov 27 17:50:26 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 17:50:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28072 >/dev/null 2>/dev/null
selfserv with PID 28072 found at Tue Nov 27 17:50:26 PST 2012
selfserv with PID 28072 started at Tue Nov 27 17:50:26 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:26 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:27 PST 2012
ssl.sh: #5644: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28072 at Tue Nov 27 17:50:27 PST 2012
kill -USR1 28072
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28072 killed at Tue Nov 27 17:50:27 PST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:50:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28151 >/dev/null 2>/dev/null
selfserv with PID 28151 found at Tue Nov 27 17:50:27 PST 2012
selfserv with PID 28151 started at Tue Nov 27 17:50:27 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:27 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:28 PST 2012
ssl.sh: #5645: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28151 at Tue Nov 27 17:50:28 PST 2012
kill -USR1 28151
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28151 killed at Tue Nov 27 17:50:28 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:50:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28209 >/dev/null 2>/dev/null
selfserv with PID 28209 found at Tue Nov 27 17:50:28 PST 2012
selfserv with PID 28209 started at Tue Nov 27 17:50:28 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:28 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:28 PST 2012
ssl.sh: #5646: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28209 at Tue Nov 27 17:50:29 PST 2012
kill -USR1 28209
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28209 killed at Tue Nov 27 17:50:29 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:50:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28267 >/dev/null 2>/dev/null
selfserv with PID 28267 found at Tue Nov 27 17:50:29 PST 2012
selfserv with PID 28267 started at Tue Nov 27 17:50:29 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:29 PST 2012
ssl.sh: #5647: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28267 at Tue Nov 27 17:50:29 PST 2012
kill -USR1 28267
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28267 killed at Tue Nov 27 17:50:29 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:50:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28325 >/dev/null 2>/dev/null
selfserv with PID 28325 found at Tue Nov 27 17:50:29 PST 2012
selfserv with PID 28325 started at Tue Nov 27 17:50:29 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:50:30 PST 2012
ssl.sh: #5648: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28325 at Tue Nov 27 17:50:30 PST 2012
kill -USR1 28325
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28325 killed at Tue Nov 27 17:50:30 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:50:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28383 >/dev/null 2>/dev/null
selfserv with PID 28383 found at Tue Nov 27 17:50:30 PST 2012
selfserv with PID 28383 started at Tue Nov 27 17:50:30 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:30 PST 2012
ssl.sh: #5649: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28383 at Tue Nov 27 17:50:30 PST 2012
kill -USR1 28383
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28383 killed at Tue Nov 27 17:50:30 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:50:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28441 >/dev/null 2>/dev/null
selfserv with PID 28441 found at Tue Nov 27 17:50:30 PST 2012
selfserv with PID 28441 started at Tue Nov 27 17:50:30 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:30 PST 2012
ssl.sh: #5650: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28441 at Tue Nov 27 17:50:30 PST 2012
kill -USR1 28441
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28441 killed at Tue Nov 27 17:50:30 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:50:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28499 >/dev/null 2>/dev/null
selfserv with PID 28499 found at Tue Nov 27 17:50:30 PST 2012
selfserv with PID 28499 started at Tue Nov 27 17:50:30 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:31 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:50:31 PST 2012
ssl.sh: #5651: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28499 at Tue Nov 27 17:50:31 PST 2012
kill -USR1 28499
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28499 killed at Tue Nov 27 17:50:31 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:50:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28557 >/dev/null 2>/dev/null
selfserv with PID 28557 found at Tue Nov 27 17:50:31 PST 2012
selfserv with PID 28557 started at Tue Nov 27 17:50:31 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:31 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:50:31 PST 2012
ssl.sh: #5652: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28557 at Tue Nov 27 17:50:31 PST 2012
kill -USR1 28557
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28557 killed at Tue Nov 27 17:50:31 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 17:50:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28621 >/dev/null 2>/dev/null
selfserv with PID 28621 found at Tue Nov 27 17:50:31 PST 2012
selfserv with PID 28621 started at Tue Nov 27 17:50:31 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:31 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:33 PST 2012
ssl.sh: #5653: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28621 at Tue Nov 27 17:50:33 PST 2012
kill -USR1 28621
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28621 killed at Tue Nov 27 17:50:33 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 17:50:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28685 >/dev/null 2>/dev/null
selfserv with PID 28685 found at Tue Nov 27 17:50:33 PST 2012
selfserv with PID 28685 started at Tue Nov 27 17:50:33 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:33 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:35 PST 2012
ssl.sh: #5654: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28685 at Tue Nov 27 17:50:35 PST 2012
kill -USR1 28685
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28685 killed at Tue Nov 27 17:50:35 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:50:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28764 >/dev/null 2>/dev/null
selfserv with PID 28764 found at Tue Nov 27 17:50:35 PST 2012
selfserv with PID 28764 started at Tue Nov 27 17:50:35 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:35 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:37 PST 2012
ssl.sh: #5655: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28764 at Tue Nov 27 17:50:37 PST 2012
kill -USR1 28764
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28764 killed at Tue Nov 27 17:50:37 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:50:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28822 >/dev/null 2>/dev/null
selfserv with PID 28822 found at Tue Nov 27 17:50:37 PST 2012
selfserv with PID 28822 started at Tue Nov 27 17:50:37 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:37 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:38 PST 2012
ssl.sh: #5656: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28822 at Tue Nov 27 17:50:38 PST 2012
kill -USR1 28822
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28822 killed at Tue Nov 27 17:50:38 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:50:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28880 >/dev/null 2>/dev/null
selfserv with PID 28880 found at Tue Nov 27 17:50:38 PST 2012
selfserv with PID 28880 started at Tue Nov 27 17:50:38 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:38 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:39 PST 2012
ssl.sh: #5657: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28880 at Tue Nov 27 17:50:39 PST 2012
kill -USR1 28880
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28880 killed at Tue Nov 27 17:50:39 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:50:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28938 >/dev/null 2>/dev/null
selfserv with PID 28938 found at Tue Nov 27 17:50:40 PST 2012
selfserv with PID 28938 started at Tue Nov 27 17:50:40 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:40 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:41 PST 2012
ssl.sh: #5658: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28938 at Tue Nov 27 17:50:41 PST 2012
kill -USR1 28938
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28938 killed at Tue Nov 27 17:50:41 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:50:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28996 >/dev/null 2>/dev/null
selfserv with PID 28996 found at Tue Nov 27 17:50:41 PST 2012
selfserv with PID 28996 started at Tue Nov 27 17:50:41 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:41 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:42 PST 2012
ssl.sh: #5659: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28996 at Tue Nov 27 17:50:42 PST 2012
kill -USR1 28996
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28996 killed at Tue Nov 27 17:50:42 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:50:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29054 >/dev/null 2>/dev/null
selfserv with PID 29054 found at Tue Nov 27 17:50:42 PST 2012
selfserv with PID 29054 started at Tue Nov 27 17:50:42 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:42 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:50:43 PST 2012
ssl.sh: #5660: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29054 at Tue Nov 27 17:50:43 PST 2012
kill -USR1 29054
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29054 killed at Tue Nov 27 17:50:43 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:50:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29133 >/dev/null 2>/dev/null
selfserv with PID 29133 found at Tue Nov 27 17:50:43 PST 2012
selfserv with PID 29133 started at Tue Nov 27 17:50:43 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:43 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:44 PST 2012
ssl.sh: #5661: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29133 at Tue Nov 27 17:50:44 PST 2012
kill -USR1 29133
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29133 killed at Tue Nov 27 17:50:44 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:50:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29191 >/dev/null 2>/dev/null
selfserv with PID 29191 found at Tue Nov 27 17:50:44 PST 2012
selfserv with PID 29191 started at Tue Nov 27 17:50:44 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:44 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:44 PST 2012
ssl.sh: #5662: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29191 at Tue Nov 27 17:50:44 PST 2012
kill -USR1 29191
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29191 killed at Tue Nov 27 17:50:44 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:50:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29250 >/dev/null 2>/dev/null
selfserv with PID 29250 found at Tue Nov 27 17:50:44 PST 2012
selfserv with PID 29250 started at Tue Nov 27 17:50:44 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:45 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:45 PST 2012
ssl.sh: #5663: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29250 at Tue Nov 27 17:50:45 PST 2012
kill -USR1 29250
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29250 killed at Tue Nov 27 17:50:45 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:50:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29317 >/dev/null 2>/dev/null
selfserv with PID 29317 found at Tue Nov 27 17:50:45 PST 2012
selfserv with PID 29317 started at Tue Nov 27 17:50:45 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:45 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:50:45 PST 2012
ssl.sh: #5664: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29317 at Tue Nov 27 17:50:45 PST 2012
kill -USR1 29317
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29317 killed at Tue Nov 27 17:50:45 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:50:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29375 >/dev/null 2>/dev/null
selfserv with PID 29375 found at Tue Nov 27 17:50:46 PST 2012
selfserv with PID 29375 started at Tue Nov 27 17:50:46 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:46 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:50:46 PST 2012
ssl.sh: #5665: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29375 at Tue Nov 27 17:50:46 PST 2012
kill -USR1 29375
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29375 killed at Tue Nov 27 17:50:46 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:50:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29433 >/dev/null 2>/dev/null
selfserv with PID 29433 found at Tue Nov 27 17:50:46 PST 2012
selfserv with PID 29433 started at Tue Nov 27 17:50:46 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:50:46 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:50:46 PST 2012
ssl.sh: #5666: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29433 at Tue Nov 27 17:50:47 PST 2012
kill -USR1 29433
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29433 killed at Tue Nov 27 17:50:47 PST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 17:50:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:47 PST 2012
selfserv with PID 29479 started at Tue Nov 27 17:50:47 PST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5667: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5668: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5669: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5670: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5671: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5672: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5673: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5674: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5675: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5676: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5677: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5678: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5679: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5680: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5681: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5682: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5683: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5684: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5685: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5686: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5687: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5688: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5689: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5690: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5691: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5692: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5693: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5694: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5695: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5696: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5697: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5698: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5699: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5700: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5701: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5702: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5703: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5704: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5705: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5706: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5707: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5708: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5709: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5710: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5711: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5712: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5713: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5714: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5715: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29479 >/dev/null 2>/dev/null
selfserv with PID 29479 found at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5716: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29479 at Tue Nov 27 17:50:54 PST 2012
kill -USR1 29479
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29479 killed at Tue Nov 27 17:50:54 PST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:50:54 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30889 >/dev/null 2>/dev/null
selfserv with PID 30889 found at Tue Nov 27 17:50:54 PST 2012
selfserv with PID 30889 started at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5717: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30889 >/dev/null 2>/dev/null
selfserv with PID 30889 found at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5718: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30889 >/dev/null 2>/dev/null
selfserv with PID 30889 found at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5719: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30889 >/dev/null 2>/dev/null
selfserv with PID 30889 found at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5720: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30889 >/dev/null 2>/dev/null
selfserv with PID 30889 found at Tue Nov 27 17:50:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5721: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30889 at Tue Nov 27 17:50:55 PST 2012
kill -USR1 30889
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30889 killed at Tue Nov 27 17:50:55 PST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:50:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:55 PST 2012
selfserv with PID 31028 started at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5722: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5723: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5724: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5725: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5726: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5727: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5728: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5729: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5730: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5731: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5732: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5733: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5734: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5735: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5736: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31028 at Tue Nov 27 17:50:57 PST 2012
kill -USR1 31028
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31028 killed at Tue Nov 27 17:50:57 PST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:50:57 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31418 >/dev/null 2>/dev/null
selfserv with PID 31418 found at Tue Nov 27 17:50:57 PST 2012
selfserv with PID 31418 started at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5737: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31418 >/dev/null 2>/dev/null
selfserv with PID 31418 found at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5738: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31418 >/dev/null 2>/dev/null
selfserv with PID 31418 found at Tue Nov 27 17:50:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5739: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31418 >/dev/null 2>/dev/null
selfserv with PID 31418 found at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5740: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31418 >/dev/null 2>/dev/null
selfserv with PID 31418 found at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5741: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31418 at Tue Nov 27 17:50:58 PST 2012
kill -USR1 31418
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31418 killed at Tue Nov 27 17:50:58 PST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:50:58 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:58 PST 2012
selfserv with PID 31557 started at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5742: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5743: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5744: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5745: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5746: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5747: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5748: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5749: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5750: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5751: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:50:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5752: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5753: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5754: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5755: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31557 >/dev/null 2>/dev/null
selfserv with PID 31557 found at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5756: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31557 at Tue Nov 27 17:51:00 PST 2012
kill -USR1 31557
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31557 killed at Tue Nov 27 17:51:00 PST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:51:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 31933 >/dev/null 2>/dev/null
selfserv with PID 31933 found at Tue Nov 27 17:51:00 PST 2012
selfserv with PID 31933 started at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5757: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31933 >/dev/null 2>/dev/null
selfserv with PID 31933 found at Tue Nov 27 17:51:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5758: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31933 >/dev/null 2>/dev/null
selfserv with PID 31933 found at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5759: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31933 >/dev/null 2>/dev/null
selfserv with PID 31933 found at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5760: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31933 >/dev/null 2>/dev/null
selfserv with PID 31933 found at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5761: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31933 at Tue Nov 27 17:51:01 PST 2012
kill -USR1 31933
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 31933 killed at Tue Nov 27 17:51:01 PST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 17:51:01 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32072 >/dev/null 2>/dev/null
selfserv with PID 32072 found at Tue Nov 27 17:51:01 PST 2012
selfserv with PID 32072 started at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5762: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32072 >/dev/null 2>/dev/null
selfserv with PID 32072 found at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5763: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32072 >/dev/null 2>/dev/null
selfserv with PID 32072 found at Tue Nov 27 17:51:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5764: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32072 >/dev/null 2>/dev/null
selfserv with PID 32072 found at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5765: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32072 >/dev/null 2>/dev/null
selfserv with PID 32072 found at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5766: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32072 at Tue Nov 27 17:51:02 PST 2012
kill -USR1 32072
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32072 killed at Tue Nov 27 17:51:02 PST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32262 >/dev/null 2>/dev/null
selfserv with PID 32262 found at Tue Nov 27 17:51:02 PST 2012
selfserv with PID 32262 started at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5767: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32262 at Tue Nov 27 17:51:02 PST 2012
kill -USR1 32262
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32262 killed at Tue Nov 27 17:51:02 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:51:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32310 >/dev/null 2>/dev/null
selfserv with PID 32310 found at Tue Nov 27 17:51:02 PST 2012
selfserv with PID 32310 started at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5768: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32310 at Tue Nov 27 17:51:02 PST 2012
kill -USR1 32310
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32310 killed at Tue Nov 27 17:51:02 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:51:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32358 >/dev/null 2>/dev/null
selfserv with PID 32358 found at Tue Nov 27 17:51:02 PST 2012
selfserv with PID 32358 started at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5769: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32358 at Tue Nov 27 17:51:03 PST 2012
kill -USR1 32358
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32358 killed at Tue Nov 27 17:51:03 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32406 >/dev/null 2>/dev/null
selfserv with PID 32406 found at Tue Nov 27 17:51:03 PST 2012
selfserv with PID 32406 started at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5770: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32406 at Tue Nov 27 17:51:03 PST 2012
kill -USR1 32406
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32406 killed at Tue Nov 27 17:51:03 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:51:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32454 >/dev/null 2>/dev/null
selfserv with PID 32454 found at Tue Nov 27 17:51:03 PST 2012
selfserv with PID 32454 started at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5771: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32454 at Tue Nov 27 17:51:03 PST 2012
kill -USR1 32454
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32454 killed at Tue Nov 27 17:51:03 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:51:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32502 >/dev/null 2>/dev/null
selfserv with PID 32502 found at Tue Nov 27 17:51:03 PST 2012
selfserv with PID 32502 started at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5772: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32502 at Tue Nov 27 17:51:03 PST 2012
kill -USR1 32502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32502 killed at Tue Nov 27 17:51:03 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32550 >/dev/null 2>/dev/null
selfserv with PID 32550 found at Tue Nov 27 17:51:03 PST 2012
selfserv with PID 32550 started at Tue Nov 27 17:51:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5773: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32550 at Tue Nov 27 17:51:04 PST 2012
kill -USR1 32550
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32550 killed at Tue Nov 27 17:51:04 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:51:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32598 >/dev/null 2>/dev/null
selfserv with PID 32598 found at Tue Nov 27 17:51:04 PST 2012
selfserv with PID 32598 started at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5774: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32598 at Tue Nov 27 17:51:04 PST 2012
kill -USR1 32598
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32598 killed at Tue Nov 27 17:51:04 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:51:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32646 >/dev/null 2>/dev/null
selfserv with PID 32646 found at Tue Nov 27 17:51:04 PST 2012
selfserv with PID 32646 started at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5775: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32646 at Tue Nov 27 17:51:04 PST 2012
kill -USR1 32646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32646 killed at Tue Nov 27 17:51:04 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32694 >/dev/null 2>/dev/null
selfserv with PID 32694 found at Tue Nov 27 17:51:04 PST 2012
selfserv with PID 32694 started at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5776: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32694 at Tue Nov 27 17:51:04 PST 2012
kill -USR1 32694
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32694 killed at Tue Nov 27 17:51:04 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:51:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32742 >/dev/null 2>/dev/null
selfserv with PID 32742 found at Tue Nov 27 17:51:04 PST 2012
selfserv with PID 32742 started at Tue Nov 27 17:51:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5777: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32742 at Tue Nov 27 17:51:05 PST 2012
kill -USR1 32742
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32742 killed at Tue Nov 27 17:51:05 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:51:05 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32790 >/dev/null 2>/dev/null
selfserv with PID 32790 found at Tue Nov 27 17:51:05 PST 2012
selfserv with PID 32790 started at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5778: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32790 at Tue Nov 27 17:51:05 PST 2012
kill -USR1 32790
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32790 killed at Tue Nov 27 17:51:05 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:05 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32838 >/dev/null 2>/dev/null
selfserv with PID 32838 found at Tue Nov 27 17:51:05 PST 2012
selfserv with PID 32838 started at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5779: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32838 at Tue Nov 27 17:51:05 PST 2012
kill -USR1 32838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32838 killed at Tue Nov 27 17:51:05 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:51:05 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32886 >/dev/null 2>/dev/null
selfserv with PID 32886 found at Tue Nov 27 17:51:05 PST 2012
selfserv with PID 32886 started at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5780: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32886 at Tue Nov 27 17:51:05 PST 2012
kill -USR1 32886
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32886 killed at Tue Nov 27 17:51:05 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:51:05 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32934 >/dev/null 2>/dev/null
selfserv with PID 32934 found at Tue Nov 27 17:51:05 PST 2012
selfserv with PID 32934 started at Tue Nov 27 17:51:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5781: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32934 at Tue Nov 27 17:51:06 PST 2012
kill -USR1 32934
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32934 killed at Tue Nov 27 17:51:06 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 32982 >/dev/null 2>/dev/null
selfserv with PID 32982 found at Tue Nov 27 17:51:06 PST 2012
selfserv with PID 32982 started at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5782: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32982 at Tue Nov 27 17:51:06 PST 2012
kill -USR1 32982
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 32982 killed at Tue Nov 27 17:51:06 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:51:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33030 >/dev/null 2>/dev/null
selfserv with PID 33030 found at Tue Nov 27 17:51:06 PST 2012
selfserv with PID 33030 started at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5783: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33030 at Tue Nov 27 17:51:06 PST 2012
kill -USR1 33030
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33030 killed at Tue Nov 27 17:51:06 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:51:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33078 >/dev/null 2>/dev/null
selfserv with PID 33078 found at Tue Nov 27 17:51:06 PST 2012
selfserv with PID 33078 started at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5784: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33078 at Tue Nov 27 17:51:06 PST 2012
kill -USR1 33078
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33078 killed at Tue Nov 27 17:51:06 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33126 >/dev/null 2>/dev/null
selfserv with PID 33126 found at Tue Nov 27 17:51:06 PST 2012
selfserv with PID 33126 started at Tue Nov 27 17:51:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5785: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33126 at Tue Nov 27 17:51:07 PST 2012
kill -USR1 33126
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33126 killed at Tue Nov 27 17:51:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:51:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33174 >/dev/null 2>/dev/null
selfserv with PID 33174 found at Tue Nov 27 17:51:07 PST 2012
selfserv with PID 33174 started at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5786: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33174 at Tue Nov 27 17:51:07 PST 2012
kill -USR1 33174
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33174 killed at Tue Nov 27 17:51:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:51:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33222 >/dev/null 2>/dev/null
selfserv with PID 33222 found at Tue Nov 27 17:51:07 PST 2012
selfserv with PID 33222 started at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5787: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33222 at Tue Nov 27 17:51:07 PST 2012
kill -USR1 33222
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33222 killed at Tue Nov 27 17:51:07 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33270 >/dev/null 2>/dev/null
selfserv with PID 33270 found at Tue Nov 27 17:51:07 PST 2012
selfserv with PID 33270 started at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5788: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33270 at Tue Nov 27 17:51:07 PST 2012
kill -USR1 33270
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33270 killed at Tue Nov 27 17:51:07 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:51:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33318 >/dev/null 2>/dev/null
selfserv with PID 33318 found at Tue Nov 27 17:51:07 PST 2012
selfserv with PID 33318 started at Tue Nov 27 17:51:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5789: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33318 at Tue Nov 27 17:51:08 PST 2012
kill -USR1 33318
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33318 killed at Tue Nov 27 17:51:08 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:51:08 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33366 >/dev/null 2>/dev/null
selfserv with PID 33366 found at Tue Nov 27 17:51:08 PST 2012
selfserv with PID 33366 started at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5790: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33366 at Tue Nov 27 17:51:08 PST 2012
kill -USR1 33366
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33366 killed at Tue Nov 27 17:51:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:08 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33414 >/dev/null 2>/dev/null
selfserv with PID 33414 found at Tue Nov 27 17:51:08 PST 2012
selfserv with PID 33414 started at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5791: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33414 at Tue Nov 27 17:51:08 PST 2012
kill -USR1 33414
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33414 killed at Tue Nov 27 17:51:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:51:08 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33462 >/dev/null 2>/dev/null
selfserv with PID 33462 found at Tue Nov 27 17:51:08 PST 2012
selfserv with PID 33462 started at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5792: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33462 at Tue Nov 27 17:51:08 PST 2012
kill -USR1 33462
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33462 killed at Tue Nov 27 17:51:08 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:51:08 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33510 >/dev/null 2>/dev/null
selfserv with PID 33510 found at Tue Nov 27 17:51:08 PST 2012
selfserv with PID 33510 started at Tue Nov 27 17:51:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5793: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33510 at Tue Nov 27 17:51:09 PST 2012
kill -USR1 33510
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33510 killed at Tue Nov 27 17:51:09 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:51:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33558 >/dev/null 2>/dev/null
selfserv with PID 33558 found at Tue Nov 27 17:51:09 PST 2012
selfserv with PID 33558 started at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5794: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33558 at Tue Nov 27 17:51:09 PST 2012
kill -USR1 33558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33558 killed at Tue Nov 27 17:51:09 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:51:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33606 >/dev/null 2>/dev/null
selfserv with PID 33606 found at Tue Nov 27 17:51:09 PST 2012
selfserv with PID 33606 started at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5795: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33606 at Tue Nov 27 17:51:09 PST 2012
kill -USR1 33606
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33606 killed at Tue Nov 27 17:51:09 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:51:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33654 >/dev/null 2>/dev/null
selfserv with PID 33654 found at Tue Nov 27 17:51:09 PST 2012
selfserv with PID 33654 started at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5796: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33654 at Tue Nov 27 17:51:09 PST 2012
kill -USR1 33654
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33654 killed at Tue Nov 27 17:51:09 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:09 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33717 >/dev/null 2>/dev/null
selfserv with PID 33717 found at Tue Nov 27 17:51:09 PST 2012
selfserv with PID 33717 started at Tue Nov 27 17:51:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5797: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33717 at Tue Nov 27 17:51:10 PST 2012
kill -USR1 33717
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33717 killed at Tue Nov 27 17:51:10 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33765 >/dev/null 2>/dev/null
selfserv with PID 33765 found at Tue Nov 27 17:51:10 PST 2012
selfserv with PID 33765 started at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5798: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33765 at Tue Nov 27 17:51:10 PST 2012
kill -USR1 33765
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33765 killed at Tue Nov 27 17:51:10 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33813 >/dev/null 2>/dev/null
selfserv with PID 33813 found at Tue Nov 27 17:51:10 PST 2012
selfserv with PID 33813 started at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5799: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 33813 at Tue Nov 27 17:51:10 PST 2012
kill -USR1 33813
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33813 killed at Tue Nov 27 17:51:10 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33861 >/dev/null 2>/dev/null
selfserv with PID 33861 found at Tue Nov 27 17:51:10 PST 2012
selfserv with PID 33861 started at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5800: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33861 at Tue Nov 27 17:51:10 PST 2012
kill -USR1 33861
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33861 killed at Tue Nov 27 17:51:10 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:10 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33909 >/dev/null 2>/dev/null
selfserv with PID 33909 found at Tue Nov 27 17:51:11 PST 2012
selfserv with PID 33909 started at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5801: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33909 at Tue Nov 27 17:51:11 PST 2012
kill -USR1 33909
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33909 killed at Tue Nov 27 17:51:11 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:11 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 33957 >/dev/null 2>/dev/null
selfserv with PID 33957 found at Tue Nov 27 17:51:11 PST 2012
selfserv with PID 33957 started at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5802: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 33957 at Tue Nov 27 17:51:11 PST 2012
kill -USR1 33957
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 33957 killed at Tue Nov 27 17:51:11 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:11 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34005 >/dev/null 2>/dev/null
selfserv with PID 34005 found at Tue Nov 27 17:51:11 PST 2012
selfserv with PID 34005 started at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5803: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 34005 at Tue Nov 27 17:51:11 PST 2012
kill -USR1 34005
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34005 killed at Tue Nov 27 17:51:11 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:11 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34053 >/dev/null 2>/dev/null
selfserv with PID 34053 found at Tue Nov 27 17:51:11 PST 2012
selfserv with PID 34053 started at Tue Nov 27 17:51:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5804: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34053 at Tue Nov 27 17:51:12 PST 2012
kill -USR1 34053
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34053 killed at Tue Nov 27 17:51:12 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34101 >/dev/null 2>/dev/null
selfserv with PID 34101 found at Tue Nov 27 17:51:12 PST 2012
selfserv with PID 34101 started at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5805: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34101 at Tue Nov 27 17:51:12 PST 2012
kill -USR1 34101
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34101 killed at Tue Nov 27 17:51:12 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34149 >/dev/null 2>/dev/null
selfserv with PID 34149 found at Tue Nov 27 17:51:12 PST 2012
selfserv with PID 34149 started at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5806: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34149 at Tue Nov 27 17:51:12 PST 2012
kill -USR1 34149
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34149 killed at Tue Nov 27 17:51:12 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34197 >/dev/null 2>/dev/null
selfserv with PID 34197 found at Tue Nov 27 17:51:12 PST 2012
selfserv with PID 34197 started at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5807: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 34197 at Tue Nov 27 17:51:12 PST 2012
kill -USR1 34197
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34197 killed at Tue Nov 27 17:51:12 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:12 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34245 >/dev/null 2>/dev/null
selfserv with PID 34245 found at Tue Nov 27 17:51:12 PST 2012
selfserv with PID 34245 started at Tue Nov 27 17:51:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5808: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34245 at Tue Nov 27 17:51:13 PST 2012
kill -USR1 34245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34245 killed at Tue Nov 27 17:51:13 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34293 >/dev/null 2>/dev/null
selfserv with PID 34293 found at Tue Nov 27 17:51:13 PST 2012
selfserv with PID 34293 started at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5809: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34293 at Tue Nov 27 17:51:13 PST 2012
kill -USR1 34293
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34293 killed at Tue Nov 27 17:51:13 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34341 >/dev/null 2>/dev/null
selfserv with PID 34341 found at Tue Nov 27 17:51:13 PST 2012
selfserv with PID 34341 started at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5810: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34341 at Tue Nov 27 17:51:13 PST 2012
kill -USR1 34341
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34341 killed at Tue Nov 27 17:51:13 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34389 >/dev/null 2>/dev/null
selfserv with PID 34389 found at Tue Nov 27 17:51:13 PST 2012
selfserv with PID 34389 started at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5811: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 34389 at Tue Nov 27 17:51:13 PST 2012
kill -USR1 34389
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34389 killed at Tue Nov 27 17:51:13 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:13 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34437 >/dev/null 2>/dev/null
selfserv with PID 34437 found at Tue Nov 27 17:51:13 PST 2012
selfserv with PID 34437 started at Tue Nov 27 17:51:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5812: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34437 at Tue Nov 27 17:51:14 PST 2012
kill -USR1 34437
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34437 killed at Tue Nov 27 17:51:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34485 >/dev/null 2>/dev/null
selfserv with PID 34485 found at Tue Nov 27 17:51:14 PST 2012
selfserv with PID 34485 started at Tue Nov 27 17:51:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5813: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34485 at Tue Nov 27 17:51:14 PST 2012
kill -USR1 34485
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34485 killed at Tue Nov 27 17:51:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34533 >/dev/null 2>/dev/null
selfserv with PID 34533 found at Tue Nov 27 17:51:14 PST 2012
selfserv with PID 34533 started at Tue Nov 27 17:51:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5814: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34533 at Tue Nov 27 17:51:14 PST 2012
kill -USR1 34533
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34533 killed at Tue Nov 27 17:51:14 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:51:14 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34581 >/dev/null 2>/dev/null
selfserv with PID 34581 found at Tue Nov 27 17:51:14 PST 2012
selfserv with PID 34581 started at Tue Nov 27 17:51:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5815: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 34581 at Tue Nov 27 17:51:14 PST 2012
kill -USR1 34581
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34581 killed at Tue Nov 27 17:51:14 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:51:15 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34629 >/dev/null 2>/dev/null
selfserv with PID 34629 found at Tue Nov 27 17:51:15 PST 2012
selfserv with PID 34629 started at Tue Nov 27 17:51:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5816: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 34629 at Tue Nov 27 17:51:15 PST 2012
kill -USR1 34629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34629 killed at Tue Nov 27 17:51:15 PST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:51:15 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34791 >/dev/null 2>/dev/null
selfserv with PID 34791 found at Tue Nov 27 17:51:15 PST 2012
selfserv with PID 34791 started at Tue Nov 27 17:51:15 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:16 PST 2012
ssl.sh: #5817: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34791 at Tue Nov 27 17:51:16 PST 2012
kill -USR1 34791
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34791 killed at Tue Nov 27 17:51:16 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:51:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34849 >/dev/null 2>/dev/null
selfserv with PID 34849 found at Tue Nov 27 17:51:16 PST 2012
selfserv with PID 34849 started at Tue Nov 27 17:51:16 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:17 PST 2012
ssl.sh: #5818: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34849 at Tue Nov 27 17:51:17 PST 2012
kill -USR1 34849
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34849 killed at Tue Nov 27 17:51:17 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:51:17 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34909 >/dev/null 2>/dev/null
selfserv with PID 34909 found at Tue Nov 27 17:51:17 PST 2012
selfserv with PID 34909 started at Tue Nov 27 17:51:17 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:18 PST 2012
ssl.sh: #5819: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34909 at Tue Nov 27 17:51:18 PST 2012
kill -USR1 34909
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34909 killed at Tue Nov 27 17:51:18 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:51:18 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 34969 >/dev/null 2>/dev/null
selfserv with PID 34969 found at Tue Nov 27 17:51:18 PST 2012
selfserv with PID 34969 started at Tue Nov 27 17:51:18 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:51:19 PST 2012
ssl.sh: #5820: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 34969 at Tue Nov 27 17:51:19 PST 2012
kill -USR1 34969
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 34969 killed at Tue Nov 27 17:51:19 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:51:19 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35027 >/dev/null 2>/dev/null
selfserv with PID 35027 found at Tue Nov 27 17:51:19 PST 2012
selfserv with PID 35027 started at Tue Nov 27 17:51:19 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:20 PST 2012
ssl.sh: #5821: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35027 at Tue Nov 27 17:51:20 PST 2012
kill -USR1 35027
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35027 killed at Tue Nov 27 17:51:20 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:51:20 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35085 >/dev/null 2>/dev/null
selfserv with PID 35085 found at Tue Nov 27 17:51:20 PST 2012
selfserv with PID 35085 started at Tue Nov 27 17:51:20 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:51:21 PST 2012
ssl.sh: #5822: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35085 at Tue Nov 27 17:51:21 PST 2012
kill -USR1 35085
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35085 killed at Tue Nov 27 17:51:21 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:51:21 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35143 >/dev/null 2>/dev/null
selfserv with PID 35143 found at Tue Nov 27 17:51:21 PST 2012
selfserv with PID 35143 started at Tue Nov 27 17:51:21 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:21 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:51:23 PST 2012
ssl.sh: #5823: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35143 at Tue Nov 27 17:51:23 PST 2012
kill -USR1 35143
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35143 killed at Tue Nov 27 17:51:23 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:51:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35230 >/dev/null 2>/dev/null
selfserv with PID 35230 found at Tue Nov 27 17:51:23 PST 2012
selfserv with PID 35230 started at Tue Nov 27 17:51:23 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:23 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:23 PST 2012
ssl.sh: #5824: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35230 at Tue Nov 27 17:51:23 PST 2012
kill -USR1 35230
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35230 killed at Tue Nov 27 17:51:23 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:51:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35288 >/dev/null 2>/dev/null
selfserv with PID 35288 found at Tue Nov 27 17:51:23 PST 2012
selfserv with PID 35288 started at Tue Nov 27 17:51:24 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:24 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:24 PST 2012
ssl.sh: #5825: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35288 at Tue Nov 27 17:51:24 PST 2012
kill -USR1 35288
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35288 killed at Tue Nov 27 17:51:24 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:51:24 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35346 >/dev/null 2>/dev/null
selfserv with PID 35346 found at Tue Nov 27 17:51:24 PST 2012
selfserv with PID 35346 started at Tue Nov 27 17:51:24 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:24 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:51:25 PST 2012
ssl.sh: #5826: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35346 at Tue Nov 27 17:51:25 PST 2012
kill -USR1 35346
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35346 killed at Tue Nov 27 17:51:25 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:51:25 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35404 >/dev/null 2>/dev/null
selfserv with PID 35404 found at Tue Nov 27 17:51:25 PST 2012
selfserv with PID 35404 started at Tue Nov 27 17:51:25 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:25 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:25 PST 2012
ssl.sh: #5827: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35404 at Tue Nov 27 17:51:25 PST 2012
kill -USR1 35404
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35404 killed at Tue Nov 27 17:51:25 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:51:25 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35462 >/dev/null 2>/dev/null
selfserv with PID 35462 found at Tue Nov 27 17:51:25 PST 2012
selfserv with PID 35462 started at Tue Nov 27 17:51:25 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:25 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:25 PST 2012
ssl.sh: #5828: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35462 at Tue Nov 27 17:51:25 PST 2012
kill -USR1 35462
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35462 killed at Tue Nov 27 17:51:25 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:51:25 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35520 >/dev/null 2>/dev/null
selfserv with PID 35520 found at Tue Nov 27 17:51:25 PST 2012
selfserv with PID 35520 started at Tue Nov 27 17:51:25 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:25 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:51:26 PST 2012
ssl.sh: #5829: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35520 at Tue Nov 27 17:51:26 PST 2012
kill -USR1 35520
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35520 killed at Tue Nov 27 17:51:26 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:51:26 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35578 >/dev/null 2>/dev/null
selfserv with PID 35578 found at Tue Nov 27 17:51:26 PST 2012
selfserv with PID 35578 started at Tue Nov 27 17:51:26 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:26 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:51:26 PST 2012
ssl.sh: #5830: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35578 at Tue Nov 27 17:51:26 PST 2012
kill -USR1 35578
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35578 killed at Tue Nov 27 17:51:26 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:51:26 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35665 >/dev/null 2>/dev/null
selfserv with PID 35665 found at Tue Nov 27 17:51:26 PST 2012
selfserv with PID 35665 started at Tue Nov 27 17:51:26 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:26 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:28 PST 2012
ssl.sh: #5831: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35665 at Tue Nov 27 17:51:28 PST 2012
kill -USR1 35665
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35665 killed at Tue Nov 27 17:51:28 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:51:28 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35723 >/dev/null 2>/dev/null
selfserv with PID 35723 found at Tue Nov 27 17:51:28 PST 2012
selfserv with PID 35723 started at Tue Nov 27 17:51:28 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:28 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:28 PST 2012
ssl.sh: #5832: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35723 at Tue Nov 27 17:51:28 PST 2012
kill -USR1 35723
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35723 killed at Tue Nov 27 17:51:28 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:51:29 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35781 >/dev/null 2>/dev/null
selfserv with PID 35781 found at Tue Nov 27 17:51:29 PST 2012
selfserv with PID 35781 started at Tue Nov 27 17:51:29 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:30 PST 2012
ssl.sh: #5833: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35781 at Tue Nov 27 17:51:30 PST 2012
kill -USR1 35781
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35781 killed at Tue Nov 27 17:51:30 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 17:51:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35839 >/dev/null 2>/dev/null
selfserv with PID 35839 found at Tue Nov 27 17:51:30 PST 2012
selfserv with PID 35839 started at Tue Nov 27 17:51:30 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:31 PST 2012
ssl.sh: #5834: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35839 at Tue Nov 27 17:51:31 PST 2012
kill -USR1 35839
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35839 killed at Tue Nov 27 17:51:31 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 17:51:31 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35897 >/dev/null 2>/dev/null
selfserv with PID 35897 found at Tue Nov 27 17:51:31 PST 2012
selfserv with PID 35897 started at Tue Nov 27 17:51:31 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:31 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:32 PST 2012
ssl.sh: #5835: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35897 at Tue Nov 27 17:51:32 PST 2012
kill -USR1 35897
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35897 killed at Tue Nov 27 17:51:32 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 17:51:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 35955 >/dev/null 2>/dev/null
selfserv with PID 35955 found at Tue Nov 27 17:51:32 PST 2012
selfserv with PID 35955 started at Tue Nov 27 17:51:32 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:32 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:51:33 PST 2012
ssl.sh: #5836: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 35955 at Tue Nov 27 17:51:33 PST 2012
kill -USR1 35955
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 35955 killed at Tue Nov 27 17:51:33 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:51:33 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36034 >/dev/null 2>/dev/null
selfserv with PID 36034 found at Tue Nov 27 17:51:33 PST 2012
selfserv with PID 36034 started at Tue Nov 27 17:51:33 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:33 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:33 PST 2012
ssl.sh: #5837: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36034 at Tue Nov 27 17:51:33 PST 2012
kill -USR1 36034
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36034 killed at Tue Nov 27 17:51:33 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 17:51:34 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36092 >/dev/null 2>/dev/null
selfserv with PID 36092 found at Tue Nov 27 17:51:34 PST 2012
selfserv with PID 36092 started at Tue Nov 27 17:51:34 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:34 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:34 PST 2012
ssl.sh: #5838: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36092 at Tue Nov 27 17:51:34 PST 2012
kill -USR1 36092
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36092 killed at Tue Nov 27 17:51:34 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:51:34 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36150 >/dev/null 2>/dev/null
selfserv with PID 36150 found at Tue Nov 27 17:51:34 PST 2012
selfserv with PID 36150 started at Tue Nov 27 17:51:34 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:34 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:34 PST 2012
ssl.sh: #5839: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36150 at Tue Nov 27 17:51:35 PST 2012
kill -USR1 36150
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36150 killed at Tue Nov 27 17:51:35 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:51:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36208 >/dev/null 2>/dev/null
selfserv with PID 36208 found at Tue Nov 27 17:51:35 PST 2012
selfserv with PID 36208 started at Tue Nov 27 17:51:35 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:35 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 17:51:35 PST 2012
ssl.sh: #5840: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36208 at Tue Nov 27 17:51:35 PST 2012
kill -USR1 36208
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36208 killed at Tue Nov 27 17:51:35 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 17:51:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36266 >/dev/null 2>/dev/null
selfserv with PID 36266 found at Tue Nov 27 17:51:35 PST 2012
selfserv with PID 36266 started at Tue Nov 27 17:51:35 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:35 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:51:35 PST 2012
ssl.sh: #5841: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36266 at Tue Nov 27 17:51:35 PST 2012
kill -USR1 36266
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36266 killed at Tue Nov 27 17:51:35 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:51:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:51:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 36324 >/dev/null 2>/dev/null
selfserv with PID 36324 found at Tue Nov 27 17:51:36 PST 2012
selfserv with PID 36324 started at Tue Nov 27 17:51:36 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:51:36 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:51:36 PST 2012
ssl.sh: #5842: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 36324 at Tue Nov 27 17:51:36 PST 2012
kill -USR1 36324
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 36324 killed at Tue Nov 27 17:51:36 PST 2012
TIMESTAMP ssl END: Tue Nov 27 17:51:36 PST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Tue Nov 27 17:51:36 PST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Tue Nov 27 17:51:36 PST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Tue Nov 27 17:51:36 PST 2012
pkits.sh: PKITS data directory /Users/tinderbox/pkits/data/ doesn't exist, skipping.
TIMESTAMP pkits END: Tue Nov 27 17:51:36 PST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 17:51:36 PST 2012
~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/aiahttp ~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/chains
httpserv starting at Tue Nov 27 17:51:36 PST 2012
httpserv -D -p 8556  \
         -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/aiahttp/http_pid.64867  &
trying to connect to httpserv at Tue Nov 27 17:51:36 PST 2012
tstclnt -p 8556 -h nss-vm-darwin9-1.community.scl3.mozilla.com -q -v
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8556 (address=63.245.223.21)
kill -0 36393 >/dev/null 2>/dev/null
httpserv with PID 36393 found at Tue Nov 27 17:51:36 PST 2012
httpserv with PID 36393 started at Tue Nov 27 17:51:36 PST 2012
~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #5843: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175137 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5844: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #5845: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #5846: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175138 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5847: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #5848: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #5849: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5850: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127175139 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5851: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #5852: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127175140 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5853: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #5854: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #5855: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #5856: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5857: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127175141   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5858: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #5859: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5860: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #5861: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #5862: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175138 (0x432f53e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:31:be:ce:15:6d:1b:d2:86:42:65:4b:b8:26:73:74:
                    c2:55:30:3a:bc:6b:cc:b5:8a:d1:1e:93:ac:2c:45:18:
                    cc:46:b7:6c:e3:8a:c5:88:09:aa:70:ae:6c:2e:19:0b:
                    87:2c:90:39:1e:09:d0:3f:ea:7b:bb:0c:54:c3:1d:02:
                    7d:86:5a:d4:01:2e:ef:92:f9:35:cf:e3:4b:c9:6b:07:
                    70:18:0e:17:b1:e6:e9:d6:7e:e1:88:d4:bd:0d:b5:29:
                    40:a8:53:81:83:f3:4c:b6:6c:1c:a0:10:f0:3d:7e:5b:
                    44:e9:a8:35:64:38:2f:d8:49:b7:97:c8:eb:76:aa:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        50:46:65:68:39:b4:e7:72:79:a0:12:c8:b5:e0:3a:79:
        49:15:55:0c:a2:88:7d:ef:59:2a:79:ce:c8:70:a8:00:
        fb:28:f7:77:d9:dd:4b:1e:26:30:1d:9c:27:73:0b:d0:
        b9:39:fb:07:4a:e4:0f:12:cf:8c:a7:86:68:e4:1d:fa:
        12:42:36:8b:11:10:76:af:f2:db:99:ee:70:a8:c4:57:
        9e:2b:0f:e5:44:e8:bf:9a:bf:4f:2b:53:89:44:38:78:
        51:45:ab:40:eb:c7:17:a2:fc:d4:bb:2a:f9:aa:19:36:
        75:8a:d3:2b:d9:25:8e:34:f7:c7:68:06:dc:03:8d:13
    Fingerprint (MD5):
        DE:7A:00:FB:FE:3A:FE:C4:BA:AA:6B:3E:B4:D8:A0:BF
    Fingerprint (SHA1):
        CB:93:57:71:43:E5:B9:76:31:F6:42:02:BF:57:D9:23:4F:78:37:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5863: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175137 (0x432f53e1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:73:8c:52:b2:6c:2a:ca:4e:bb:0c:b0:3c:f7:63:07:
                    2e:26:57:a1:73:28:97:b5:78:d5:d6:dd:b3:a2:71:20:
                    5d:74:78:54:dd:a8:01:e9:38:15:01:ac:75:d0:59:00:
                    30:ad:bd:7b:99:36:4d:99:e3:c9:80:a1:d6:0e:98:4f:
                    71:49:9e:6b:f7:7b:10:2d:e1:df:22:80:b0:ed:3c:28:
                    e6:46:ca:84:bf:72:6e:27:ad:72:06:55:90:b0:8d:15:
                    80:e0:db:c9:c8:4e:1c:d0:a8:dd:0e:13:0b:cf:2c:4c:
                    b0:31:4e:c8:a0:a6:f1:de:ba:9b:7d:8c:35:68:b6:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:eb:11:ba:c3:51:05:bf:b5:12:18:26:c7:2a:3d:05:
        b6:2e:df:d6:48:d9:4e:f6:eb:f3:13:17:2a:dc:e9:15:
        dd:c0:81:6b:b9:ce:04:f5:c8:b3:73:8c:b0:e2:43:25:
        49:dd:36:76:38:85:bc:51:b8:08:6c:1e:13:cb:80:82:
        83:93:3d:dc:83:ab:f5:59:1e:4a:f5:ff:21:1f:a9:c8:
        96:42:5f:1c:15:13:e9:17:f5:0f:4c:73:5f:f4:74:01:
        80:6a:d2:06:4a:fc:2b:e4:f5:ea:ed:0f:cf:08:45:a7:
        aa:e9:be:5f:46:03:59:b9:e7:0b:b2:7e:ef:4f:6c:5e
    Fingerprint (MD5):
        2A:85:BA:7A:79:D7:F4:B3:81:F4:FA:89:65:1C:24:CF
    Fingerprint (SHA1):
        28:08:BF:04:F7:88:1B:85:A2:C5:10:29:3D:2C:EB:13:3B:EF:14:DD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5864: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #5865: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #5866: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #5867: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175137 (0x432f53e1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:73:8c:52:b2:6c:2a:ca:4e:bb:0c:b0:3c:f7:63:07:
                    2e:26:57:a1:73:28:97:b5:78:d5:d6:dd:b3:a2:71:20:
                    5d:74:78:54:dd:a8:01:e9:38:15:01:ac:75:d0:59:00:
                    30:ad:bd:7b:99:36:4d:99:e3:c9:80:a1:d6:0e:98:4f:
                    71:49:9e:6b:f7:7b:10:2d:e1:df:22:80:b0:ed:3c:28:
                    e6:46:ca:84:bf:72:6e:27:ad:72:06:55:90:b0:8d:15:
                    80:e0:db:c9:c8:4e:1c:d0:a8:dd:0e:13:0b:cf:2c:4c:
                    b0:31:4e:c8:a0:a6:f1:de:ba:9b:7d:8c:35:68:b6:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:eb:11:ba:c3:51:05:bf:b5:12:18:26:c7:2a:3d:05:
        b6:2e:df:d6:48:d9:4e:f6:eb:f3:13:17:2a:dc:e9:15:
        dd:c0:81:6b:b9:ce:04:f5:c8:b3:73:8c:b0:e2:43:25:
        49:dd:36:76:38:85:bc:51:b8:08:6c:1e:13:cb:80:82:
        83:93:3d:dc:83:ab:f5:59:1e:4a:f5:ff:21:1f:a9:c8:
        96:42:5f:1c:15:13:e9:17:f5:0f:4c:73:5f:f4:74:01:
        80:6a:d2:06:4a:fc:2b:e4:f5:ea:ed:0f:cf:08:45:a7:
        aa:e9:be:5f:46:03:59:b9:e7:0b:b2:7e:ef:4f:6c:5e
    Fingerprint (MD5):
        2A:85:BA:7A:79:D7:F4:B3:81:F4:FA:89:65:1C:24:CF
    Fingerprint (SHA1):
        28:08:BF:04:F7:88:1B:85:A2:C5:10:29:3D:2C:EB:13:3B:EF:14:DD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5868: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175138 (0x432f53e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:31:be:ce:15:6d:1b:d2:86:42:65:4b:b8:26:73:74:
                    c2:55:30:3a:bc:6b:cc:b5:8a:d1:1e:93:ac:2c:45:18:
                    cc:46:b7:6c:e3:8a:c5:88:09:aa:70:ae:6c:2e:19:0b:
                    87:2c:90:39:1e:09:d0:3f:ea:7b:bb:0c:54:c3:1d:02:
                    7d:86:5a:d4:01:2e:ef:92:f9:35:cf:e3:4b:c9:6b:07:
                    70:18:0e:17:b1:e6:e9:d6:7e:e1:88:d4:bd:0d:b5:29:
                    40:a8:53:81:83:f3:4c:b6:6c:1c:a0:10:f0:3d:7e:5b:
                    44:e9:a8:35:64:38:2f:d8:49:b7:97:c8:eb:76:aa:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        50:46:65:68:39:b4:e7:72:79:a0:12:c8:b5:e0:3a:79:
        49:15:55:0c:a2:88:7d:ef:59:2a:79:ce:c8:70:a8:00:
        fb:28:f7:77:d9:dd:4b:1e:26:30:1d:9c:27:73:0b:d0:
        b9:39:fb:07:4a:e4:0f:12:cf:8c:a7:86:68:e4:1d:fa:
        12:42:36:8b:11:10:76:af:f2:db:99:ee:70:a8:c4:57:
        9e:2b:0f:e5:44:e8:bf:9a:bf:4f:2b:53:89:44:38:78:
        51:45:ab:40:eb:c7:17:a2:fc:d4:bb:2a:f9:aa:19:36:
        75:8a:d3:2b:d9:25:8e:34:f7:c7:68:06:dc:03:8d:13
    Fingerprint (MD5):
        DE:7A:00:FB:FE:3A:FE:C4:BA:AA:6B:3E:B4:D8:A0:BF
    Fingerprint (SHA1):
        CB:93:57:71:43:E5:B9:76:31:F6:42:02:BF:57:D9:23:4F:78:37:ED

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5869: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #5870: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #5871: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #5872: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #5873: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #5874: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175138 (0x432f53e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:31:be:ce:15:6d:1b:d2:86:42:65:4b:b8:26:73:74:
                    c2:55:30:3a:bc:6b:cc:b5:8a:d1:1e:93:ac:2c:45:18:
                    cc:46:b7:6c:e3:8a:c5:88:09:aa:70:ae:6c:2e:19:0b:
                    87:2c:90:39:1e:09:d0:3f:ea:7b:bb:0c:54:c3:1d:02:
                    7d:86:5a:d4:01:2e:ef:92:f9:35:cf:e3:4b:c9:6b:07:
                    70:18:0e:17:b1:e6:e9:d6:7e:e1:88:d4:bd:0d:b5:29:
                    40:a8:53:81:83:f3:4c:b6:6c:1c:a0:10:f0:3d:7e:5b:
                    44:e9:a8:35:64:38:2f:d8:49:b7:97:c8:eb:76:aa:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        50:46:65:68:39:b4:e7:72:79:a0:12:c8:b5:e0:3a:79:
        49:15:55:0c:a2:88:7d:ef:59:2a:79:ce:c8:70:a8:00:
        fb:28:f7:77:d9:dd:4b:1e:26:30:1d:9c:27:73:0b:d0:
        b9:39:fb:07:4a:e4:0f:12:cf:8c:a7:86:68:e4:1d:fa:
        12:42:36:8b:11:10:76:af:f2:db:99:ee:70:a8:c4:57:
        9e:2b:0f:e5:44:e8:bf:9a:bf:4f:2b:53:89:44:38:78:
        51:45:ab:40:eb:c7:17:a2:fc:d4:bb:2a:f9:aa:19:36:
        75:8a:d3:2b:d9:25:8e:34:f7:c7:68:06:dc:03:8d:13
    Fingerprint (MD5):
        DE:7A:00:FB:FE:3A:FE:C4:BA:AA:6B:3E:B4:D8:A0:BF
    Fingerprint (SHA1):
        CB:93:57:71:43:E5:B9:76:31:F6:42:02:BF:57:D9:23:4F:78:37:ED


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5875: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175138 (0x432f53e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:31:be:ce:15:6d:1b:d2:86:42:65:4b:b8:26:73:74:
                    c2:55:30:3a:bc:6b:cc:b5:8a:d1:1e:93:ac:2c:45:18:
                    cc:46:b7:6c:e3:8a:c5:88:09:aa:70:ae:6c:2e:19:0b:
                    87:2c:90:39:1e:09:d0:3f:ea:7b:bb:0c:54:c3:1d:02:
                    7d:86:5a:d4:01:2e:ef:92:f9:35:cf:e3:4b:c9:6b:07:
                    70:18:0e:17:b1:e6:e9:d6:7e:e1:88:d4:bd:0d:b5:29:
                    40:a8:53:81:83:f3:4c:b6:6c:1c:a0:10:f0:3d:7e:5b:
                    44:e9:a8:35:64:38:2f:d8:49:b7:97:c8:eb:76:aa:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        50:46:65:68:39:b4:e7:72:79:a0:12:c8:b5:e0:3a:79:
        49:15:55:0c:a2:88:7d:ef:59:2a:79:ce:c8:70:a8:00:
        fb:28:f7:77:d9:dd:4b:1e:26:30:1d:9c:27:73:0b:d0:
        b9:39:fb:07:4a:e4:0f:12:cf:8c:a7:86:68:e4:1d:fa:
        12:42:36:8b:11:10:76:af:f2:db:99:ee:70:a8:c4:57:
        9e:2b:0f:e5:44:e8:bf:9a:bf:4f:2b:53:89:44:38:78:
        51:45:ab:40:eb:c7:17:a2:fc:d4:bb:2a:f9:aa:19:36:
        75:8a:d3:2b:d9:25:8e:34:f7:c7:68:06:dc:03:8d:13
    Fingerprint (MD5):
        DE:7A:00:FB:FE:3A:FE:C4:BA:AA:6B:3E:B4:D8:A0:BF
    Fingerprint (SHA1):
        CB:93:57:71:43:E5:B9:76:31:F6:42:02:BF:57:D9:23:4F:78:37:ED


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5876: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #5877: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #5878: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #5879: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #5880: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #5881: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175137 (0x432f53e1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:73:8c:52:b2:6c:2a:ca:4e:bb:0c:b0:3c:f7:63:07:
                    2e:26:57:a1:73:28:97:b5:78:d5:d6:dd:b3:a2:71:20:
                    5d:74:78:54:dd:a8:01:e9:38:15:01:ac:75:d0:59:00:
                    30:ad:bd:7b:99:36:4d:99:e3:c9:80:a1:d6:0e:98:4f:
                    71:49:9e:6b:f7:7b:10:2d:e1:df:22:80:b0:ed:3c:28:
                    e6:46:ca:84:bf:72:6e:27:ad:72:06:55:90:b0:8d:15:
                    80:e0:db:c9:c8:4e:1c:d0:a8:dd:0e:13:0b:cf:2c:4c:
                    b0:31:4e:c8:a0:a6:f1:de:ba:9b:7d:8c:35:68:b6:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:eb:11:ba:c3:51:05:bf:b5:12:18:26:c7:2a:3d:05:
        b6:2e:df:d6:48:d9:4e:f6:eb:f3:13:17:2a:dc:e9:15:
        dd:c0:81:6b:b9:ce:04:f5:c8:b3:73:8c:b0:e2:43:25:
        49:dd:36:76:38:85:bc:51:b8:08:6c:1e:13:cb:80:82:
        83:93:3d:dc:83:ab:f5:59:1e:4a:f5:ff:21:1f:a9:c8:
        96:42:5f:1c:15:13:e9:17:f5:0f:4c:73:5f:f4:74:01:
        80:6a:d2:06:4a:fc:2b:e4:f5:ea:ed:0f:cf:08:45:a7:
        aa:e9:be:5f:46:03:59:b9:e7:0b:b2:7e:ef:4f:6c:5e
    Fingerprint (MD5):
        2A:85:BA:7A:79:D7:F4:B3:81:F4:FA:89:65:1C:24:CF
    Fingerprint (SHA1):
        28:08:BF:04:F7:88:1B:85:A2:C5:10:29:3D:2C:EB:13:3B:EF:14:DD


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5882: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175137 (0x432f53e1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:37 2012
            Not After : Tue Nov 28 01:51:37 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:73:8c:52:b2:6c:2a:ca:4e:bb:0c:b0:3c:f7:63:07:
                    2e:26:57:a1:73:28:97:b5:78:d5:d6:dd:b3:a2:71:20:
                    5d:74:78:54:dd:a8:01:e9:38:15:01:ac:75:d0:59:00:
                    30:ad:bd:7b:99:36:4d:99:e3:c9:80:a1:d6:0e:98:4f:
                    71:49:9e:6b:f7:7b:10:2d:e1:df:22:80:b0:ed:3c:28:
                    e6:46:ca:84:bf:72:6e:27:ad:72:06:55:90:b0:8d:15:
                    80:e0:db:c9:c8:4e:1c:d0:a8:dd:0e:13:0b:cf:2c:4c:
                    b0:31:4e:c8:a0:a6:f1:de:ba:9b:7d:8c:35:68:b6:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:eb:11:ba:c3:51:05:bf:b5:12:18:26:c7:2a:3d:05:
        b6:2e:df:d6:48:d9:4e:f6:eb:f3:13:17:2a:dc:e9:15:
        dd:c0:81:6b:b9:ce:04:f5:c8:b3:73:8c:b0:e2:43:25:
        49:dd:36:76:38:85:bc:51:b8:08:6c:1e:13:cb:80:82:
        83:93:3d:dc:83:ab:f5:59:1e:4a:f5:ff:21:1f:a9:c8:
        96:42:5f:1c:15:13:e9:17:f5:0f:4c:73:5f:f4:74:01:
        80:6a:d2:06:4a:fc:2b:e4:f5:ea:ed:0f:cf:08:45:a7:
        aa:e9:be:5f:46:03:59:b9:e7:0b:b2:7e:ef:4f:6c:5e
    Fingerprint (MD5):
        2A:85:BA:7A:79:D7:F4:B3:81:F4:FA:89:65:1C:24:CF
    Fingerprint (SHA1):
        28:08:BF:04:F7:88:1B:85:A2:C5:10:29:3D:2C:EB:13:3B:EF:14:DD


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5883: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #5884: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175142 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5885: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #5886: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #5887: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175143 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5888: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #5889: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #5890: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175144 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5891: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #5892: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #5893: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175145 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5894: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #5895: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #5896: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175146 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5897: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #5898: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #5899: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175147 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5900: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #5901: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #5902: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175148 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5903: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #5904: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #5905: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175149 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5906: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #5907: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #5908: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175150 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5909: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #5910: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #5911: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o Bridge11Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5912: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127175151 -7 Bridge11@Root1  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5913: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #5914: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127175152 -7 Bridge11@Root2  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5915: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #5916: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127175153 -7 Bridge11@Root3  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5917: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #5918: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #5919: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #5920: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o Bridge12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5921: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127175154 -7 Bridge12@Root4  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5922: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #5923: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127175155 -7 Bridge12@Root5  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5924: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #5925: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127175156 -7 Bridge12@Root6  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5926: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #5927: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #5928: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #5929: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o Bridge13Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5930: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127175157 -7 Bridge13@Root7  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5931: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #5932: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127175158 -7 Bridge13@Root8  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5933: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #5934: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127175159 -7 Bridge13@Root9  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5935: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #5936: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #5937: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #5938: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o Bridge21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5939: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127175160 -7 Bridge21@Bridge11  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5940: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #5941: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127175161 -7 Bridge21@Bridge12  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5942: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #5943: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127175162 -7 Bridge21@Bridge13  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5944: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #5945: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #5946: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5947: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5948: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127175163   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5949: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #5950: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5951: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5952: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127175164   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #5953: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #5954: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175142 (0x432f53e6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:42 2012
            Not After : Tue Nov 28 01:51:42 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:3e:11:50:56:ea:1a:fa:b2:d4:e8:02:43:15:aa:f2:
                    8b:5e:9f:b0:b7:62:3b:a7:f3:19:b7:a8:a2:6d:e7:3b:
                    68:7c:9b:c2:f1:37:b6:73:8a:2e:57:22:66:92:86:30:
                    16:5b:00:49:e8:3f:b0:9b:3b:02:34:1b:3f:ab:8c:bf:
                    7a:3f:bc:43:65:81:94:66:36:6e:aa:6a:8c:53:5e:ac:
                    97:6a:70:1c:9b:bc:f5:cd:67:8b:b9:cb:bf:ec:56:d7:
                    e9:ab:aa:1d:48:37:ef:e9:dd:dc:90:4e:5c:68:5b:ea:
                    12:43:e9:d9:79:ed:bc:a2:13:b7:2e:b2:32:f7:69:b7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:9f:ce:0a:58:d2:5b:b5:55:d1:ac:3e:53:ee:df:17:
        55:60:86:d5:76:3a:85:6e:8a:f5:be:31:78:01:7c:ea:
        02:05:6b:38:f5:64:3f:99:73:60:3c:47:5f:80:1e:2d:
        6b:bf:e5:84:90:88:c4:54:24:3b:88:57:d1:a3:1b:4f:
        10:1e:70:52:ad:df:cc:f3:f0:d2:eb:05:49:f4:89:14:
        01:39:69:1a:14:1e:e7:9d:c7:c5:77:fb:86:80:33:41:
        d9:22:81:54:60:a1:4f:cf:16:1c:c0:34:f3:bb:b0:28:
        a4:9f:6f:a7:64:32:3c:9a:ca:97:f4:5d:7e:df:43:d8
    Fingerprint (MD5):
        30:E5:FE:E9:5E:3A:D7:B1:58:CE:1F:89:94:1B:B5:23
    Fingerprint (SHA1):
        BF:C7:04:41:5A:E6:DA:0D:C9:4E:3A:5A:90:28:EB:2B:65:A8:32:60


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #5955: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175143 (0x432f53e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:43 2012
            Not After : Tue Nov 28 01:51:43 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:d7:2f:8c:24:ca:8d:ab:ae:5c:1b:3d:11:9a:4f:ca:
                    06:79:a5:7a:00:64:b3:67:9c:f0:c7:9e:b2:39:3b:05:
                    12:1f:79:91:64:a8:f6:11:43:c3:ad:6f:0c:d4:52:73:
                    f6:80:33:9b:66:f0:0f:41:18:55:06:21:18:ce:5f:61:
                    d5:cf:f1:59:51:8e:21:58:07:f8:16:b1:dc:d7:73:fa:
                    f1:6f:59:d5:2a:c8:55:22:c5:19:f0:e7:99:99:ab:91:
                    b9:a1:9c:47:3d:ec:b6:77:18:74:1f:93:85:dd:c5:a7:
                    97:92:2d:f0:84:be:e1:99:a4:3c:17:85:78:32:b0:79
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        27:b5:c9:42:7a:c9:eb:da:7f:42:25:0b:fd:62:46:a1:
        d9:12:28:14:bf:30:2a:85:91:7b:47:49:5d:51:44:6c:
        5e:a9:39:c2:41:6f:0f:5d:01:4d:90:6a:78:15:65:73:
        a1:10:b4:fe:5a:6c:07:c8:5d:50:c3:39:cb:89:c1:19:
        cb:7e:8f:74:80:78:38:f6:ad:e4:c7:6a:fb:77:ca:53:
        bc:41:a4:b5:3c:bb:f4:68:79:3b:c8:6a:9f:e5:dc:43:
        fb:e2:e7:6d:49:7d:50:b1:9d:5f:eb:44:2c:77:08:79:
        d6:50:5e:82:68:fa:70:22:4d:d3:da:a3:18:c7:d2:05
    Fingerprint (MD5):
        8C:B0:71:7D:48:AA:89:DB:F4:66:CC:4B:31:4D:2D:A0
    Fingerprint (SHA1):
        5D:33:3C:0F:23:16:07:9D:53:41:A9:1F:29:96:DA:9F:87:E9:C6:EF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #5956: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175144 (0x432f53e8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:43 2012
            Not After : Tue Nov 28 01:51:43 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:95:d0:85:6c:2c:f8:6c:e7:33:cf:3c:7b:ee:05:b8:
                    3f:cd:07:24:8e:46:31:84:f6:ab:3d:43:fa:8c:19:ee:
                    49:fd:95:fb:a6:03:d5:bc:bc:80:08:66:d6:2c:75:eb:
                    7c:73:77:84:a8:33:eb:43:9d:50:00:06:94:68:20:e7:
                    12:1e:5a:41:7f:86:d5:08:9e:a7:aa:28:f4:81:9d:42:
                    d9:cc:75:c9:30:80:e9:9f:9f:2b:e9:25:37:5b:73:2a:
                    97:a1:92:17:14:cb:94:ea:4b:71:95:88:c9:73:bb:11:
                    d4:5a:c7:dd:a6:87:02:ba:1c:bb:20:61:ee:b2:d7:c7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b5:b1:ca:be:fa:58:97:a3:14:25:47:6d:17:28:04:b4:
        b7:17:9a:7c:24:be:19:df:d6:87:24:18:85:a8:7f:4e:
        27:0f:82:e1:d2:d9:41:b7:ff:36:7d:70:49:df:c5:fb:
        3d:0b:86:98:7d:f8:37:16:8f:bf:b0:8e:bf:a2:75:f0:
        9e:12:18:69:98:2b:aa:7a:ad:d8:49:e1:3f:d0:98:48:
        3d:66:17:54:1b:a5:1d:9d:3e:f4:1d:1d:03:bb:9b:0e:
        17:14:dc:d9:9b:93:07:1e:c0:79:f6:1c:22:cd:86:fd:
        48:63:7b:59:53:dd:17:30:5b:70:4f:7d:2b:f2:0e:8f
    Fingerprint (MD5):
        9D:9F:0D:67:B6:50:A2:67:66:71:0B:28:62:50:50:E7
    Fingerprint (SHA1):
        9C:25:02:D2:21:0A:2A:CB:E0:2B:98:59:56:38:F4:35:E0:58:A0:27


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #5957: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175145 (0x432f53e9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:44 2012
            Not After : Tue Nov 28 01:51:44 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:67:0d:f3:e8:6c:30:a7:fe:16:2c:ad:af:75:c4:29:
                    a2:5f:65:b1:e1:45:66:b8:73:32:3c:66:ee:ef:b1:f1:
                    16:e7:e6:8d:e9:5e:c6:6f:cc:9d:be:ca:0f:a0:26:ef:
                    d9:70:bc:4e:8d:2c:2e:d9:94:1d:fc:70:c9:ce:8a:ce:
                    03:9f:ca:82:a6:12:d2:73:97:9f:f8:3a:79:5d:72:d0:
                    56:4e:14:a9:82:12:5c:73:4c:91:c2:09:0f:27:eb:de:
                    4a:3f:e5:5b:23:6e:94:cd:0e:d4:f6:bb:94:4e:31:b7:
                    d1:a7:ff:93:64:42:24:1e:c0:07:29:24:f7:d3:80:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        87:d9:6f:82:85:2e:af:f8:4e:a8:bb:bc:87:5b:90:c7:
        a4:b5:24:40:0c:5f:f1:4c:5e:b2:fd:2f:3f:4b:49:f1:
        d9:ea:a8:92:21:b8:a5:ef:df:3b:32:f1:82:b4:b0:21:
        e1:02:3b:4b:d7:44:e9:74:cb:32:c4:a2:aa:11:8a:3a:
        7c:ee:3b:68:20:f3:6e:15:44:67:9f:e3:9c:1a:8c:ae:
        dc:0f:04:12:f1:9e:74:80:98:10:38:dc:d4:87:87:8a:
        55:c0:36:17:29:b3:cf:62:c9:53:19:57:43:8f:c5:9c:
        2d:fc:ae:c8:82:89:af:2f:f8:89:13:c9:f9:f1:8a:10
    Fingerprint (MD5):
        E2:29:07:4C:85:E5:EA:A3:48:09:29:B1:40:06:C5:A2
    Fingerprint (SHA1):
        36:23:4D:D9:D5:A7:22:3E:DC:14:53:F7:1C:8C:22:00:B8:34:64:AE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #5958: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175146 (0x432f53ea)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:44 2012
            Not After : Tue Nov 28 01:51:44 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:c1:8e:32:09:c2:be:e6:e0:96:16:4a:84:d4:3c:cf:
                    ba:59:65:d4:29:f5:bd:e4:6e:8d:6a:6f:71:fc:ce:f4:
                    1f:d9:b7:5e:2d:05:07:f0:0c:11:1d:11:dc:d3:f8:2f:
                    66:4d:6a:95:f8:c7:e3:f0:6d:fb:7f:6f:21:ef:44:0e:
                    0a:af:2c:a5:1f:20:a2:6a:69:93:89:1d:37:a5:0a:0b:
                    87:10:e4:c5:73:ea:ee:2c:bd:81:73:6a:54:e1:20:e6:
                    67:57:78:24:bc:1b:aa:7e:25:22:13:26:75:6e:db:6a:
                    ae:ab:41:8a:62:8a:2d:32:51:f4:a7:02:5f:9e:8a:23
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:6f:49:56:87:97:e1:ed:9c:cc:66:bf:2a:62:d1:bd:
        f7:ec:07:8a:0e:7f:64:f7:3e:0a:00:0c:3e:ad:26:9f:
        4b:04:62:b9:e7:ae:d0:ef:27:60:1a:e5:5e:9d:83:2c:
        14:da:27:5d:56:da:73:4a:e3:cb:8b:43:b8:1e:a7:3a:
        1a:9b:5c:6c:ba:b3:3a:43:f7:b2:73:a5:3f:c8:f1:f3:
        cd:84:09:7c:4e:bc:b6:df:79:9d:5a:9a:f1:e6:66:db:
        52:bc:f5:05:6e:bf:d7:98:a8:8d:72:d8:34:db:b4:36:
        c4:09:56:1a:eb:55:a4:12:ee:7e:06:60:36:81:3d:5e
    Fingerprint (MD5):
        FA:BD:3D:81:91:87:3E:9D:56:01:36:E2:0A:A2:A1:8C
    Fingerprint (SHA1):
        22:C7:E8:73:70:FF:6C:4E:63:D4:07:04:04:7E:0B:37:31:FD:35:27


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #5959: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175147 (0x432f53eb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:45 2012
            Not After : Tue Nov 28 01:51:45 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9e:ca:09:3f:ed:88:97:39:e5:95:5e:59:88:4b:7f:78:
                    11:85:d6:51:f8:dc:fb:21:ee:08:1c:2a:62:6b:9e:df:
                    59:5c:31:3c:90:56:ef:fd:8b:58:2c:6c:6e:72:ba:d5:
                    79:a1:be:0b:0d:b1:a1:66:bd:e1:d8:2e:3f:d9:ca:98:
                    53:d9:b3:23:c6:6d:70:cd:96:8e:eb:f6:a2:b1:ea:dd:
                    c7:da:e4:4f:1d:79:39:b7:59:a1:38:42:2d:1d:a8:d5:
                    5e:ae:9c:13:91:43:a1:e1:6a:c8:ae:9b:8e:84:1c:48:
                    5e:1b:65:44:eb:7d:c4:a2:ce:4a:5c:72:9f:1c:e8:b1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        80:d7:cb:00:e2:f0:21:2b:e3:b8:57:d8:c8:e1:b3:8a:
        12:af:43:ce:89:bc:fc:0f:3b:4e:89:e0:f3:8b:80:56:
        cd:a8:7f:07:6f:dc:16:d4:e8:37:87:20:fa:e2:40:3f:
        f9:2a:06:5e:a0:6f:e8:fa:ed:18:95:56:51:32:ae:6e:
        4c:3c:28:e9:c8:e2:47:c6:dd:10:f2:79:0f:e0:5d:ba:
        42:51:43:07:c2:0a:7a:76:61:e6:23:fd:c6:d7:ea:a8:
        96:ec:85:21:6a:a9:ac:50:07:41:80:6e:f1:78:1a:07:
        6b:39:bc:d9:f3:24:d3:79:e1:40:10:17:05:61:ad:a2
    Fingerprint (MD5):
        94:E3:06:0B:E6:A2:29:8E:8D:BF:75:0C:19:72:12:AC
    Fingerprint (SHA1):
        48:63:7B:8C:B0:E4:4A:9F:57:60:72:8B:E0:E8:60:4C:A2:98:AF:36


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #5960: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175148 (0x432f53ec)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:45 2012
            Not After : Tue Nov 28 01:51:45 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:05:8e:02:83:3d:92:db:a1:0b:b2:a7:66:87:44:57:
                    40:32:4f:98:db:f6:a2:af:e9:99:23:70:dd:4b:a7:1b:
                    1d:c8:e7:cf:e0:0d:70:94:8b:53:be:e9:1c:40:1f:dd:
                    3b:b2:7a:21:5e:1a:68:e8:ac:69:fb:cc:da:44:46:07:
                    ea:69:c9:c8:72:4b:e7:44:03:29:63:16:a5:78:08:30:
                    31:96:ec:56:92:a3:52:b7:87:9c:e0:30:92:69:2f:48:
                    1d:2c:c4:93:dc:26:5d:8a:76:d6:db:d3:93:39:a9:a9:
                    c8:72:b3:c4:90:85:20:8d:93:9e:fe:94:05:d9:30:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e7:94:a3:fe:6e:8c:57:3a:06:c9:34:17:ac:78:98:
        f5:e5:b9:0c:7c:a4:9f:a3:09:36:64:5a:3f:95:70:13:
        21:5f:f1:49:46:e3:4d:3b:01:d9:11:b1:19:ba:39:29:
        27:cd:f6:c6:b3:7b:ca:32:b8:a2:85:95:a9:6a:71:2e:
        d7:f2:eb:1d:de:c7:eb:e4:1f:37:34:c4:79:64:33:11:
        db:bf:d1:15:e5:73:db:6c:85:62:12:ca:b2:42:89:c1:
        ac:5d:59:4c:62:fe:43:ca:ba:6a:4c:cf:a8:94:dc:5d:
        0c:3a:1e:1c:ba:65:9f:e2:b7:2a:e1:6f:72:98:c6:f7
    Fingerprint (MD5):
        6D:40:FE:AC:EC:FE:44:98:83:18:20:E1:50:10:D0:95
    Fingerprint (SHA1):
        BF:44:3D:7D:6C:CF:C6:A5:4F:14:C1:CD:E9:88:06:0C:6C:7B:25:EA


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #5961: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175149 (0x432f53ed)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:46 2012
            Not After : Tue Nov 28 01:51:46 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:37:f2:04:10:b2:50:b5:d3:ae:5e:79:2b:25:ee:a7:
                    68:5b:51:76:6c:4f:52:24:86:ae:32:5a:56:00:34:44:
                    4b:83:a9:ed:cf:ee:2c:98:51:d7:12:be:e2:57:88:d0:
                    8d:09:d4:46:25:8d:1c:1d:37:09:9c:3c:b7:a0:64:f8:
                    55:14:e5:a6:53:0c:08:85:33:cf:f5:80:02:cb:34:da:
                    88:da:2e:c7:cb:0d:9b:69:a8:9e:bc:e8:9f:dd:19:c9:
                    f7:b1:81:5f:92:fa:3c:8c:99:56:63:c7:73:70:9a:5e:
                    9a:3f:f9:6b:d3:cc:94:d1:b2:b0:ff:ba:ab:b3:28:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:b2:9c:d8:0c:6b:ca:98:f5:64:d2:78:ee:c3:40:4a:
        a1:a5:a0:23:7d:b3:3d:05:42:2f:a9:45:68:0b:94:3c:
        44:e4:e1:08:57:7a:29:9e:f4:1c:60:94:a4:48:07:7d:
        db:5d:97:18:87:d0:9f:cf:8e:18:a9:b4:b0:d8:82:8e:
        73:bc:6e:4c:80:ad:92:3a:9d:e3:0f:bf:60:64:01:2c:
        eb:12:0b:4f:97:f7:88:de:3f:d7:fe:1e:a6:2a:7c:56:
        bf:36:65:13:9b:f6:ad:db:f2:e1:a7:77:55:47:3f:af:
        5c:f9:fb:5e:9e:bb:f0:73:85:c5:30:b8:ba:aa:17:28
    Fingerprint (MD5):
        61:9A:49:F7:37:8A:D8:B0:4D:C9:0B:44:0C:44:93:C6
    Fingerprint (SHA1):
        D7:02:25:27:3A:F6:61:07:06:72:5D:B7:41:75:86:DF:C5:60:99:11


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #5962: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175150 (0x432f53ee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:46 2012
            Not After : Tue Nov 28 01:51:46 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:0b:4b:cf:5d:6c:df:b5:e8:86:f4:d6:66:28:b5:90:
                    b2:b8:9a:05:81:e5:99:39:01:93:5c:d4:fa:4d:c0:c4:
                    8a:c4:3a:b4:7d:02:2d:33:5c:1f:f4:be:2c:92:1f:e9:
                    b3:db:9c:cf:24:27:96:65:23:d1:0a:4d:16:c1:3e:0f:
                    00:f6:b3:ee:6f:af:90:91:60:1e:14:01:7d:a1:26:9d:
                    13:d5:97:00:d3:5b:b7:3c:6e:78:0a:84:d1:0b:fc:99:
                    6a:fa:57:8d:c0:89:51:46:b3:22:9a:0a:1b:d5:7f:df:
                    07:82:0d:cf:09:3d:64:4e:b1:34:27:dc:88:04:98:c7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        65:62:1c:dd:66:67:39:a6:e6:07:ca:98:30:b6:e7:55:
        8d:fc:9e:d2:24:93:d0:dd:7c:cf:4f:4f:f3:88:0b:1f:
        03:02:3f:53:c0:8f:1f:0b:28:f2:be:28:dc:3c:40:ca:
        f0:94:4f:c0:ea:c5:fe:9f:b2:f5:6c:a8:05:d3:6e:4e:
        bf:d5:ba:49:98:0d:eb:50:c1:b5:b1:ad:7a:08:9b:25:
        dd:b5:34:6f:be:da:e8:96:67:0e:ce:56:ba:13:7f:bf:
        f2:a8:ba:4f:e3:ec:a7:28:66:85:e1:91:f2:3a:50:e8:
        d6:e2:d5:ef:f6:c4:3d:54:f2:b1:89:ce:32:02:46:3c
    Fingerprint (MD5):
        99:D7:B8:3A:2C:F0:69:EA:A4:74:49:92:B3:45:D8:2B
    Fingerprint (SHA1):
        7D:85:84:3A:73:CC:2E:B5:90:93:1A:32:82:79:5F:F9:F2:7F:50:2D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #5963: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5964: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175165 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5965: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5966: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5967: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5968: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127175166   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5969: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #5970: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5971: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5972: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127175167   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5973: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #5974: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #5975: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5976: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127175168   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5977: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #5978: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5979: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175165 (0x432f53fd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:54 2012
            Not After : Tue Nov 28 01:51:54 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:a7:77:d8:0a:d1:45:e4:a4:ea:d5:3a:6d:e2:cc:85:
                    40:98:bf:35:84:0d:dc:46:1a:fa:69:76:97:6a:57:08:
                    20:ac:4d:2b:b0:04:57:03:30:53:a3:03:c7:ef:dd:fa:
                    ca:8b:03:2a:ac:0b:8d:14:82:f5:03:d8:62:08:f0:0d:
                    9f:18:f3:ce:09:04:e5:20:c6:d0:0b:3c:32:d8:f4:c8:
                    2c:80:90:0e:28:d7:97:35:24:3f:7f:3c:b8:e2:38:96:
                    de:52:90:aa:8c:12:b3:df:ef:3c:d8:a1:ea:2d:4e:e2:
                    57:1d:30:c7:f0:b4:f4:3e:81:9a:4a:5d:99:d3:e4:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:8e:14:2f:70:8b:7f:bc:4f:d1:0e:08:b6:f0:6f:f3:
        33:85:d9:52:63:a3:d2:b0:21:01:c0:0d:b7:a7:92:03:
        cd:53:66:f3:f7:4f:76:24:f7:88:0f:6d:06:7a:3f:46:
        05:b2:58:a6:8a:92:68:b9:a6:c8:e2:49:d2:5c:86:34:
        b4:8d:93:cc:a7:57:82:46:16:8c:a5:c3:60:8e:ce:0e:
        64:91:1c:4c:ee:04:ca:d0:ee:68:2f:ee:fc:96:a9:18:
        70:76:22:d7:f8:5d:d9:8a:f8:f5:e3:e0:e5:9d:fb:21:
        f7:7a:72:14:02:38:fb:d5:bb:c6:0e:65:54:02:4b:8f
    Fingerprint (MD5):
        B2:FC:99:14:F3:70:C9:D7:37:DC:88:2E:23:85:47:F9
    Fingerprint (SHA1):
        FD:DF:70:25:BA:51:EB:B9:34:23:C1:8F:15:F1:12:70:B3:60:BB:18


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5980: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5981: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175166 (0x432f53fe)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:55 2012
            Not After : Tue Nov 28 01:51:55 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:97:d6:4b:1f:79:61:ba:f5:4e:bd:b2:2a:fb:b1:83:
                    a0:70:1e:1d:c8:a9:e8:49:c3:61:68:d2:ec:79:ef:f7:
                    52:5e:77:2b:54:bd:4d:bb:43:a5:0e:57:60:25:71:13:
                    d9:f1:c8:aa:9b:c2:14:3f:da:35:f3:a5:ee:a6:15:17:
                    e3:38:84:e9:3b:ee:ed:cb:01:5c:87:ce:76:f3:aa:88:
                    62:9e:6b:8d:4d:d7:7e:a4:b1:41:9c:3a:04:0d:76:18:
                    a6:7f:bf:49:fa:09:1a:ca:91:2a:03:89:7c:9c:a6:a8:
                    7c:ce:f9:6b:1c:5b:13:c5:98:7b:d9:f7:5d:87:5d:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        30:8a:0d:62:0a:ab:33:ca:97:00:f8:35:91:e1:8b:24:
        98:01:b2:be:23:6c:5a:78:e6:8a:00:29:7f:17:5d:6e:
        83:8d:c7:c3:df:e0:c1:89:c6:d7:37:e5:b7:ef:23:12:
        df:e3:c4:e6:3f:f4:48:91:71:19:04:54:04:bc:46:13:
        62:4c:5b:c3:78:41:92:cf:d1:81:61:4e:e9:79:32:80:
        d2:43:0d:03:af:77:b8:70:53:de:3c:99:e6:50:c6:eb:
        f0:84:95:23:40:6f:43:82:ca:2c:bb:67:94:10:20:c4:
        25:fc:bf:8d:0f:2b:2b:32:43:3f:4d:6e:56:0c:d5:14
    Fingerprint (MD5):
        B8:5C:C3:D5:B8:47:BA:49:01:B5:BC:94:AE:8E:71:3B
    Fingerprint (SHA1):
        ED:C3:41:5B:61:2E:DD:4B:AF:A5:5F:BB:4E:A9:0B:E8:F2:15:BA:39


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5982: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5983: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175167 (0x432f53ff)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:56 2012
            Not After : Tue Nov 28 01:51:56 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    97:6c:be:64:7e:8d:a3:02:71:82:bb:64:31:fa:75:67:
                    bf:0e:4d:fe:b9:f5:c4:9c:23:72:ba:f7:53:30:40:d7:
                    22:0b:13:6c:c7:66:5b:75:08:ae:cc:fc:cb:db:21:07:
                    5a:4c:82:32:2e:35:c4:53:87:c3:fd:2c:6e:c7:f7:83:
                    26:45:2b:eb:43:f0:57:3b:18:33:db:94:92:75:1d:c5:
                    a6:2a:d2:01:0b:50:8c:23:40:cf:5c:b3:31:dc:af:f4:
                    0c:20:f7:56:62:89:64:97:86:31:e7:7c:25:bd:4a:98:
                    03:96:f8:e1:7a:68:76:54:e4:8a:ab:80:c4:69:e4:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:4e:1e:7f:34:ad:b9:70:7e:a7:05:b7:66:46:4c:1b:
        46:a1:42:ec:19:5e:b8:26:2a:65:cf:2d:4d:cb:fa:45:
        ae:74:b6:19:74:f1:11:1a:3d:12:34:24:71:5c:dc:15:
        5a:85:b1:8b:36:4d:91:d9:77:7b:0b:05:2c:f9:a4:29:
        5e:c9:f2:4f:0d:5b:30:80:d2:44:16:4c:8e:85:3e:3b:
        83:85:64:5c:87:5d:fc:9e:7c:ee:59:ab:81:76:00:cf:
        8e:0d:21:90:10:e7:58:62:7d:65:83:5a:62:eb:5b:43:
        d4:c5:c9:27:01:8b:b5:2e:ce:77:ab:56:e2:6e:19:c1
    Fingerprint (MD5):
        2C:30:07:1E:D0:8F:E3:D2:2A:F1:05:0D:1F:F3:17:A7
    Fingerprint (SHA1):
        2E:B9:BC:E2:E8:F0:91:0C:E1:8A:B5:80:82:2C:26:6F:18:BC:02:03


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #5984: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5985: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #5986: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #5987: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #5988: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175165 (0x432f53fd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:54 2012
            Not After : Tue Nov 28 01:51:54 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:a7:77:d8:0a:d1:45:e4:a4:ea:d5:3a:6d:e2:cc:85:
                    40:98:bf:35:84:0d:dc:46:1a:fa:69:76:97:6a:57:08:
                    20:ac:4d:2b:b0:04:57:03:30:53:a3:03:c7:ef:dd:fa:
                    ca:8b:03:2a:ac:0b:8d:14:82:f5:03:d8:62:08:f0:0d:
                    9f:18:f3:ce:09:04:e5:20:c6:d0:0b:3c:32:d8:f4:c8:
                    2c:80:90:0e:28:d7:97:35:24:3f:7f:3c:b8:e2:38:96:
                    de:52:90:aa:8c:12:b3:df:ef:3c:d8:a1:ea:2d:4e:e2:
                    57:1d:30:c7:f0:b4:f4:3e:81:9a:4a:5d:99:d3:e4:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:8e:14:2f:70:8b:7f:bc:4f:d1:0e:08:b6:f0:6f:f3:
        33:85:d9:52:63:a3:d2:b0:21:01:c0:0d:b7:a7:92:03:
        cd:53:66:f3:f7:4f:76:24:f7:88:0f:6d:06:7a:3f:46:
        05:b2:58:a6:8a:92:68:b9:a6:c8:e2:49:d2:5c:86:34:
        b4:8d:93:cc:a7:57:82:46:16:8c:a5:c3:60:8e:ce:0e:
        64:91:1c:4c:ee:04:ca:d0:ee:68:2f:ee:fc:96:a9:18:
        70:76:22:d7:f8:5d:d9:8a:f8:f5:e3:e0:e5:9d:fb:21:
        f7:7a:72:14:02:38:fb:d5:bb:c6:0e:65:54:02:4b:8f
    Fingerprint (MD5):
        B2:FC:99:14:F3:70:C9:D7:37:DC:88:2E:23:85:47:F9
    Fingerprint (SHA1):
        FD:DF:70:25:BA:51:EB:B9:34:23:C1:8F:15:F1:12:70:B3:60:BB:18

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5989: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5990: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175166 (0x432f53fe)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:55 2012
            Not After : Tue Nov 28 01:51:55 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:97:d6:4b:1f:79:61:ba:f5:4e:bd:b2:2a:fb:b1:83:
                    a0:70:1e:1d:c8:a9:e8:49:c3:61:68:d2:ec:79:ef:f7:
                    52:5e:77:2b:54:bd:4d:bb:43:a5:0e:57:60:25:71:13:
                    d9:f1:c8:aa:9b:c2:14:3f:da:35:f3:a5:ee:a6:15:17:
                    e3:38:84:e9:3b:ee:ed:cb:01:5c:87:ce:76:f3:aa:88:
                    62:9e:6b:8d:4d:d7:7e:a4:b1:41:9c:3a:04:0d:76:18:
                    a6:7f:bf:49:fa:09:1a:ca:91:2a:03:89:7c:9c:a6:a8:
                    7c:ce:f9:6b:1c:5b:13:c5:98:7b:d9:f7:5d:87:5d:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        30:8a:0d:62:0a:ab:33:ca:97:00:f8:35:91:e1:8b:24:
        98:01:b2:be:23:6c:5a:78:e6:8a:00:29:7f:17:5d:6e:
        83:8d:c7:c3:df:e0:c1:89:c6:d7:37:e5:b7:ef:23:12:
        df:e3:c4:e6:3f:f4:48:91:71:19:04:54:04:bc:46:13:
        62:4c:5b:c3:78:41:92:cf:d1:81:61:4e:e9:79:32:80:
        d2:43:0d:03:af:77:b8:70:53:de:3c:99:e6:50:c6:eb:
        f0:84:95:23:40:6f:43:82:ca:2c:bb:67:94:10:20:c4:
        25:fc:bf:8d:0f:2b:2b:32:43:3f:4d:6e:56:0c:d5:14
    Fingerprint (MD5):
        B8:5C:C3:D5:B8:47:BA:49:01:B5:BC:94:AE:8E:71:3B
    Fingerprint (SHA1):
        ED:C3:41:5B:61:2E:DD:4B:AF:A5:5F:BB:4E:A9:0B:E8:F2:15:BA:39

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5991: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5992: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175167 (0x432f53ff)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:56 2012
            Not After : Tue Nov 28 01:51:56 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    97:6c:be:64:7e:8d:a3:02:71:82:bb:64:31:fa:75:67:
                    bf:0e:4d:fe:b9:f5:c4:9c:23:72:ba:f7:53:30:40:d7:
                    22:0b:13:6c:c7:66:5b:75:08:ae:cc:fc:cb:db:21:07:
                    5a:4c:82:32:2e:35:c4:53:87:c3:fd:2c:6e:c7:f7:83:
                    26:45:2b:eb:43:f0:57:3b:18:33:db:94:92:75:1d:c5:
                    a6:2a:d2:01:0b:50:8c:23:40:cf:5c:b3:31:dc:af:f4:
                    0c:20:f7:56:62:89:64:97:86:31:e7:7c:25:bd:4a:98:
                    03:96:f8:e1:7a:68:76:54:e4:8a:ab:80:c4:69:e4:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:4e:1e:7f:34:ad:b9:70:7e:a7:05:b7:66:46:4c:1b:
        46:a1:42:ec:19:5e:b8:26:2a:65:cf:2d:4d:cb:fa:45:
        ae:74:b6:19:74:f1:11:1a:3d:12:34:24:71:5c:dc:15:
        5a:85:b1:8b:36:4d:91:d9:77:7b:0b:05:2c:f9:a4:29:
        5e:c9:f2:4f:0d:5b:30:80:d2:44:16:4c:8e:85:3e:3b:
        83:85:64:5c:87:5d:fc:9e:7c:ee:59:ab:81:76:00:cf:
        8e:0d:21:90:10:e7:58:62:7d:65:83:5a:62:eb:5b:43:
        d4:c5:c9:27:01:8b:b5:2e:ce:77:ab:56:e2:6e:19:c1
    Fingerprint (MD5):
        2C:30:07:1E:D0:8F:E3:D2:2A:F1:05:0D:1F:F3:17:A7
    Fingerprint (SHA1):
        2E:B9:BC:E2:E8:F0:91:0C:E1:8A:B5:80:82:2C:26:6F:18:BC:02:03

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #5993: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5994: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5995: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175169 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #5996: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5997: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5998: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5999: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127175170   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6000: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6001: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6002: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6003: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127175171   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6004: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6005: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #6006: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o User1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6007: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127175172   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6008: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #6009: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #6010: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o User2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6011: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127175173   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6012: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #6013: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6014: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175169 (0x432f5401)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    98:52:21:1f:9c:fd:89:59:0c:66:29:6a:f8:4d:01:b6:
                    c0:5d:24:0e:61:ee:8d:2e:f6:00:bc:75:2f:e9:1a:a3:
                    e1:8a:2e:51:60:8b:ff:b0:b9:27:a2:1d:5a:e3:ab:0d:
                    b9:30:37:3c:54:44:67:9c:3a:80:be:20:3d:ed:69:8a:
                    da:c3:f5:9a:01:a4:7b:c3:42:93:21:5f:f6:c1:dc:9c:
                    70:eb:f8:b2:8f:27:86:a4:97:dd:93:84:f1:04:ec:3b:
                    bb:b2:bf:1c:5e:b9:37:8c:39:19:4e:92:ff:63:78:7d:
                    45:96:a2:de:28:7d:25:cc:b2:68:df:bf:44:29:df:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:1d:96:f9:61:27:66:c5:6c:20:ed:e6:7f:e6:9a:83:
        49:2e:68:83:92:02:10:93:7b:7a:d8:e1:a7:e9:c6:76:
        ad:34:f7:df:3c:39:60:46:4e:1d:e4:a3:bf:30:d5:b9:
        b5:98:64:d0:3a:55:e0:75:51:7e:8d:76:17:e5:17:27:
        85:59:a1:c9:09:8e:a4:1a:98:b1:6b:90:77:d2:de:23:
        19:25:1c:a8:f9:a8:10:f1:0a:b3:c0:6d:95:a4:8c:6b:
        56:db:c4:0a:fc:3f:4a:13:4f:a9:69:36:15:6b:26:55:
        49:41:b1:1c:40:be:c4:10:92:ef:7e:34:56:e0:5f:c4
    Fingerprint (MD5):
        C2:47:AF:D1:C2:69:C6:6A:AF:FA:C9:DD:F4:E4:12:FE
    Fingerprint (SHA1):
        DE:6A:5B:80:9C:78:96:4A:5B:DB:3C:96:88:8C:76:F5:39:12:06:7D


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6015: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6016: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175170 (0x432f5402)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:c1:41:5a:be:a6:b5:5d:32:de:72:d3:2c:01:07:9c:
                    7c:a7:04:2a:53:60:54:a4:db:c0:e7:6b:66:af:5f:8a:
                    85:b7:70:c9:0b:e5:9c:d5:aa:45:b0:00:d9:6e:67:e7:
                    71:46:a3:4a:2b:3a:82:fa:c2:cc:2d:af:7e:f6:a3:46:
                    7d:fd:14:bf:6c:d1:b4:ca:c9:08:29:44:63:1b:71:e2:
                    c7:ac:70:01:e7:1c:36:5b:c8:7b:70:0f:1c:db:c1:3c:
                    d3:7d:66:d1:b8:72:bb:9b:de:46:2d:59:5a:37:d7:2c:
                    54:d5:26:ea:1a:e8:ac:5f:97:09:f0:cf:65:af:31:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:80:54:99:93:fb:b7:cf:1a:96:43:20:82:7d:63:8a:
        0b:03:bd:22:a2:c5:ec:3f:4c:81:10:c6:d5:ba:39:57:
        74:10:69:5c:de:48:be:94:cf:b3:52:c4:68:b1:73:fd:
        39:a8:91:4e:d2:ab:0e:35:ee:e3:21:9f:13:9a:5a:3c:
        1f:e7:81:29:0e:ff:1f:05:e3:16:47:f3:8c:53:22:aa:
        e7:41:78:77:8f:95:a5:0b:46:fc:9d:9b:70:26:8e:f9:
        cd:8c:2b:e7:ff:1a:10:0e:74:03:8c:79:8b:24:4a:19:
        e9:85:96:02:43:9d:0e:71:3d:fc:b9:0a:b7:17:d1:f8
    Fingerprint (MD5):
        F9:D2:28:FF:2D:66:4F:22:C7:32:9C:3A:0B:C2:7A:25
    Fingerprint (SHA1):
        B7:6C:DF:4C:5B:9B:E6:5B:EE:B8:EF:5D:04:53:7B:0F:84:A1:9A:BD


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6017: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6018: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175171 (0x432f5403)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:00 2012
            Not After : Tue Nov 28 01:52:00 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:48:db:04:ca:7e:a9:2e:50:c9:17:01:52:ac:23:4e:
                    39:18:5e:5b:3f:31:b2:ca:72:02:f7:51:b9:9f:84:c6:
                    c3:a5:06:02:20:45:57:d5:a4:42:81:aa:74:c6:46:dc:
                    99:d5:2e:39:45:68:19:6f:26:50:d6:73:66:1c:f2:51:
                    21:9c:3f:f4:08:2a:75:64:bd:26:58:1a:64:3e:2f:f7:
                    8c:82:f1:81:36:cb:a6:af:dd:a9:e1:8a:91:47:bf:3a:
                    fe:dd:a2:60:39:ac:e4:0d:72:c3:dd:35:2b:eb:4e:96:
                    50:07:93:94:43:71:f6:be:1f:14:af:d1:10:44:a6:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:35:13:30:58:99:4f:ec:b9:ec:07:87:d9:57:ca:49:
        79:e1:96:c6:a3:14:02:4d:9d:49:d0:40:83:db:43:dd:
        4b:8e:1f:88:9f:7f:c3:56:3d:ea:86:6a:c1:94:72:01:
        32:5f:59:04:34:53:dc:87:2d:ec:7e:fc:8f:f4:87:54:
        11:78:a6:03:4c:77:af:39:75:6e:88:aa:6d:d3:b7:64:
        6d:f1:06:a4:75:96:e1:cb:70:50:c8:5f:7c:3f:dc:e5:
        c4:d9:cf:8b:20:49:6d:50:8d:93:52:c9:8b:79:db:4b:
        4e:96:ed:ee:4d:33:ec:d3:da:a9:b2:b4:26:01:e9:76
    Fingerprint (MD5):
        11:EE:22:75:77:73:D7:4F:7B:30:FD:24:0E:80:68:8D
    Fingerprint (SHA1):
        26:E7:24:76:AD:C6:C5:7F:24:00:93:A2:83:8B:EF:71:B7:CE:E6:46


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6019: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6020: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6021: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6022: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6023: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175169 (0x432f5401)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    98:52:21:1f:9c:fd:89:59:0c:66:29:6a:f8:4d:01:b6:
                    c0:5d:24:0e:61:ee:8d:2e:f6:00:bc:75:2f:e9:1a:a3:
                    e1:8a:2e:51:60:8b:ff:b0:b9:27:a2:1d:5a:e3:ab:0d:
                    b9:30:37:3c:54:44:67:9c:3a:80:be:20:3d:ed:69:8a:
                    da:c3:f5:9a:01:a4:7b:c3:42:93:21:5f:f6:c1:dc:9c:
                    70:eb:f8:b2:8f:27:86:a4:97:dd:93:84:f1:04:ec:3b:
                    bb:b2:bf:1c:5e:b9:37:8c:39:19:4e:92:ff:63:78:7d:
                    45:96:a2:de:28:7d:25:cc:b2:68:df:bf:44:29:df:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:1d:96:f9:61:27:66:c5:6c:20:ed:e6:7f:e6:9a:83:
        49:2e:68:83:92:02:10:93:7b:7a:d8:e1:a7:e9:c6:76:
        ad:34:f7:df:3c:39:60:46:4e:1d:e4:a3:bf:30:d5:b9:
        b5:98:64:d0:3a:55:e0:75:51:7e:8d:76:17:e5:17:27:
        85:59:a1:c9:09:8e:a4:1a:98:b1:6b:90:77:d2:de:23:
        19:25:1c:a8:f9:a8:10:f1:0a:b3:c0:6d:95:a4:8c:6b:
        56:db:c4:0a:fc:3f:4a:13:4f:a9:69:36:15:6b:26:55:
        49:41:b1:1c:40:be:c4:10:92:ef:7e:34:56:e0:5f:c4
    Fingerprint (MD5):
        C2:47:AF:D1:C2:69:C6:6A:AF:FA:C9:DD:F4:E4:12:FE
    Fingerprint (SHA1):
        DE:6A:5B:80:9C:78:96:4A:5B:DB:3C:96:88:8C:76:F5:39:12:06:7D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6024: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6025: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175170 (0x432f5402)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:c1:41:5a:be:a6:b5:5d:32:de:72:d3:2c:01:07:9c:
                    7c:a7:04:2a:53:60:54:a4:db:c0:e7:6b:66:af:5f:8a:
                    85:b7:70:c9:0b:e5:9c:d5:aa:45:b0:00:d9:6e:67:e7:
                    71:46:a3:4a:2b:3a:82:fa:c2:cc:2d:af:7e:f6:a3:46:
                    7d:fd:14:bf:6c:d1:b4:ca:c9:08:29:44:63:1b:71:e2:
                    c7:ac:70:01:e7:1c:36:5b:c8:7b:70:0f:1c:db:c1:3c:
                    d3:7d:66:d1:b8:72:bb:9b:de:46:2d:59:5a:37:d7:2c:
                    54:d5:26:ea:1a:e8:ac:5f:97:09:f0:cf:65:af:31:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:80:54:99:93:fb:b7:cf:1a:96:43:20:82:7d:63:8a:
        0b:03:bd:22:a2:c5:ec:3f:4c:81:10:c6:d5:ba:39:57:
        74:10:69:5c:de:48:be:94:cf:b3:52:c4:68:b1:73:fd:
        39:a8:91:4e:d2:ab:0e:35:ee:e3:21:9f:13:9a:5a:3c:
        1f:e7:81:29:0e:ff:1f:05:e3:16:47:f3:8c:53:22:aa:
        e7:41:78:77:8f:95:a5:0b:46:fc:9d:9b:70:26:8e:f9:
        cd:8c:2b:e7:ff:1a:10:0e:74:03:8c:79:8b:24:4a:19:
        e9:85:96:02:43:9d:0e:71:3d:fc:b9:0a:b7:17:d1:f8
    Fingerprint (MD5):
        F9:D2:28:FF:2D:66:4F:22:C7:32:9C:3A:0B:C2:7A:25
    Fingerprint (SHA1):
        B7:6C:DF:4C:5B:9B:E6:5B:EE:B8:EF:5D:04:53:7B:0F:84:A1:9A:BD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6026: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6027: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175171 (0x432f5403)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:00 2012
            Not After : Tue Nov 28 01:52:00 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:48:db:04:ca:7e:a9:2e:50:c9:17:01:52:ac:23:4e:
                    39:18:5e:5b:3f:31:b2:ca:72:02:f7:51:b9:9f:84:c6:
                    c3:a5:06:02:20:45:57:d5:a4:42:81:aa:74:c6:46:dc:
                    99:d5:2e:39:45:68:19:6f:26:50:d6:73:66:1c:f2:51:
                    21:9c:3f:f4:08:2a:75:64:bd:26:58:1a:64:3e:2f:f7:
                    8c:82:f1:81:36:cb:a6:af:dd:a9:e1:8a:91:47:bf:3a:
                    fe:dd:a2:60:39:ac:e4:0d:72:c3:dd:35:2b:eb:4e:96:
                    50:07:93:94:43:71:f6:be:1f:14:af:d1:10:44:a6:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:35:13:30:58:99:4f:ec:b9:ec:07:87:d9:57:ca:49:
        79:e1:96:c6:a3:14:02:4d:9d:49:d0:40:83:db:43:dd:
        4b:8e:1f:88:9f:7f:c3:56:3d:ea:86:6a:c1:94:72:01:
        32:5f:59:04:34:53:dc:87:2d:ec:7e:fc:8f:f4:87:54:
        11:78:a6:03:4c:77:af:39:75:6e:88:aa:6d:d3:b7:64:
        6d:f1:06:a4:75:96:e1:cb:70:50:c8:5f:7c:3f:dc:e5:
        c4:d9:cf:8b:20:49:6d:50:8d:93:52:c9:8b:79:db:4b:
        4e:96:ed:ee:4d:33:ec:d3:da:a9:b2:b4:26:01:e9:76
    Fingerprint (MD5):
        11:EE:22:75:77:73:D7:4F:7B:30:FD:24:0E:80:68:8D
    Fingerprint (SHA1):
        26:E7:24:76:AD:C6:C5:7F:24:00:93:A2:83:8B:EF:71:B7:CE:E6:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6028: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6029: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175169 (0x432f5401)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    98:52:21:1f:9c:fd:89:59:0c:66:29:6a:f8:4d:01:b6:
                    c0:5d:24:0e:61:ee:8d:2e:f6:00:bc:75:2f:e9:1a:a3:
                    e1:8a:2e:51:60:8b:ff:b0:b9:27:a2:1d:5a:e3:ab:0d:
                    b9:30:37:3c:54:44:67:9c:3a:80:be:20:3d:ed:69:8a:
                    da:c3:f5:9a:01:a4:7b:c3:42:93:21:5f:f6:c1:dc:9c:
                    70:eb:f8:b2:8f:27:86:a4:97:dd:93:84:f1:04:ec:3b:
                    bb:b2:bf:1c:5e:b9:37:8c:39:19:4e:92:ff:63:78:7d:
                    45:96:a2:de:28:7d:25:cc:b2:68:df:bf:44:29:df:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:1d:96:f9:61:27:66:c5:6c:20:ed:e6:7f:e6:9a:83:
        49:2e:68:83:92:02:10:93:7b:7a:d8:e1:a7:e9:c6:76:
        ad:34:f7:df:3c:39:60:46:4e:1d:e4:a3:bf:30:d5:b9:
        b5:98:64:d0:3a:55:e0:75:51:7e:8d:76:17:e5:17:27:
        85:59:a1:c9:09:8e:a4:1a:98:b1:6b:90:77:d2:de:23:
        19:25:1c:a8:f9:a8:10:f1:0a:b3:c0:6d:95:a4:8c:6b:
        56:db:c4:0a:fc:3f:4a:13:4f:a9:69:36:15:6b:26:55:
        49:41:b1:1c:40:be:c4:10:92:ef:7e:34:56:e0:5f:c4
    Fingerprint (MD5):
        C2:47:AF:D1:C2:69:C6:6A:AF:FA:C9:DD:F4:E4:12:FE
    Fingerprint (SHA1):
        DE:6A:5B:80:9C:78:96:4A:5B:DB:3C:96:88:8C:76:F5:39:12:06:7D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6030: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175169 (0x432f5401)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    98:52:21:1f:9c:fd:89:59:0c:66:29:6a:f8:4d:01:b6:
                    c0:5d:24:0e:61:ee:8d:2e:f6:00:bc:75:2f:e9:1a:a3:
                    e1:8a:2e:51:60:8b:ff:b0:b9:27:a2:1d:5a:e3:ab:0d:
                    b9:30:37:3c:54:44:67:9c:3a:80:be:20:3d:ed:69:8a:
                    da:c3:f5:9a:01:a4:7b:c3:42:93:21:5f:f6:c1:dc:9c:
                    70:eb:f8:b2:8f:27:86:a4:97:dd:93:84:f1:04:ec:3b:
                    bb:b2:bf:1c:5e:b9:37:8c:39:19:4e:92:ff:63:78:7d:
                    45:96:a2:de:28:7d:25:cc:b2:68:df:bf:44:29:df:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:1d:96:f9:61:27:66:c5:6c:20:ed:e6:7f:e6:9a:83:
        49:2e:68:83:92:02:10:93:7b:7a:d8:e1:a7:e9:c6:76:
        ad:34:f7:df:3c:39:60:46:4e:1d:e4:a3:bf:30:d5:b9:
        b5:98:64:d0:3a:55:e0:75:51:7e:8d:76:17:e5:17:27:
        85:59:a1:c9:09:8e:a4:1a:98:b1:6b:90:77:d2:de:23:
        19:25:1c:a8:f9:a8:10:f1:0a:b3:c0:6d:95:a4:8c:6b:
        56:db:c4:0a:fc:3f:4a:13:4f:a9:69:36:15:6b:26:55:
        49:41:b1:1c:40:be:c4:10:92:ef:7e:34:56:e0:5f:c4
    Fingerprint (MD5):
        C2:47:AF:D1:C2:69:C6:6A:AF:FA:C9:DD:F4:E4:12:FE
    Fingerprint (SHA1):
        DE:6A:5B:80:9C:78:96:4A:5B:DB:3C:96:88:8C:76:F5:39:12:06:7D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6031: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175170 (0x432f5402)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:c1:41:5a:be:a6:b5:5d:32:de:72:d3:2c:01:07:9c:
                    7c:a7:04:2a:53:60:54:a4:db:c0:e7:6b:66:af:5f:8a:
                    85:b7:70:c9:0b:e5:9c:d5:aa:45:b0:00:d9:6e:67:e7:
                    71:46:a3:4a:2b:3a:82:fa:c2:cc:2d:af:7e:f6:a3:46:
                    7d:fd:14:bf:6c:d1:b4:ca:c9:08:29:44:63:1b:71:e2:
                    c7:ac:70:01:e7:1c:36:5b:c8:7b:70:0f:1c:db:c1:3c:
                    d3:7d:66:d1:b8:72:bb:9b:de:46:2d:59:5a:37:d7:2c:
                    54:d5:26:ea:1a:e8:ac:5f:97:09:f0:cf:65:af:31:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:80:54:99:93:fb:b7:cf:1a:96:43:20:82:7d:63:8a:
        0b:03:bd:22:a2:c5:ec:3f:4c:81:10:c6:d5:ba:39:57:
        74:10:69:5c:de:48:be:94:cf:b3:52:c4:68:b1:73:fd:
        39:a8:91:4e:d2:ab:0e:35:ee:e3:21:9f:13:9a:5a:3c:
        1f:e7:81:29:0e:ff:1f:05:e3:16:47:f3:8c:53:22:aa:
        e7:41:78:77:8f:95:a5:0b:46:fc:9d:9b:70:26:8e:f9:
        cd:8c:2b:e7:ff:1a:10:0e:74:03:8c:79:8b:24:4a:19:
        e9:85:96:02:43:9d:0e:71:3d:fc:b9:0a:b7:17:d1:f8
    Fingerprint (MD5):
        F9:D2:28:FF:2D:66:4F:22:C7:32:9C:3A:0B:C2:7A:25
    Fingerprint (SHA1):
        B7:6C:DF:4C:5B:9B:E6:5B:EE:B8:EF:5D:04:53:7B:0F:84:A1:9A:BD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6032: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175170 (0x432f5402)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:51:59 2012
            Not After : Tue Nov 28 01:51:59 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:c1:41:5a:be:a6:b5:5d:32:de:72:d3:2c:01:07:9c:
                    7c:a7:04:2a:53:60:54:a4:db:c0:e7:6b:66:af:5f:8a:
                    85:b7:70:c9:0b:e5:9c:d5:aa:45:b0:00:d9:6e:67:e7:
                    71:46:a3:4a:2b:3a:82:fa:c2:cc:2d:af:7e:f6:a3:46:
                    7d:fd:14:bf:6c:d1:b4:ca:c9:08:29:44:63:1b:71:e2:
                    c7:ac:70:01:e7:1c:36:5b:c8:7b:70:0f:1c:db:c1:3c:
                    d3:7d:66:d1:b8:72:bb:9b:de:46:2d:59:5a:37:d7:2c:
                    54:d5:26:ea:1a:e8:ac:5f:97:09:f0:cf:65:af:31:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:80:54:99:93:fb:b7:cf:1a:96:43:20:82:7d:63:8a:
        0b:03:bd:22:a2:c5:ec:3f:4c:81:10:c6:d5:ba:39:57:
        74:10:69:5c:de:48:be:94:cf:b3:52:c4:68:b1:73:fd:
        39:a8:91:4e:d2:ab:0e:35:ee:e3:21:9f:13:9a:5a:3c:
        1f:e7:81:29:0e:ff:1f:05:e3:16:47:f3:8c:53:22:aa:
        e7:41:78:77:8f:95:a5:0b:46:fc:9d:9b:70:26:8e:f9:
        cd:8c:2b:e7:ff:1a:10:0e:74:03:8c:79:8b:24:4a:19:
        e9:85:96:02:43:9d:0e:71:3d:fc:b9:0a:b7:17:d1:f8
    Fingerprint (MD5):
        F9:D2:28:FF:2D:66:4F:22:C7:32:9C:3A:0B:C2:7A:25
    Fingerprint (SHA1):
        B7:6C:DF:4C:5B:9B:E6:5B:EE:B8:EF:5D:04:53:7B:0F:84:A1:9A:BD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6033: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175171 (0x432f5403)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:00 2012
            Not After : Tue Nov 28 01:52:00 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:48:db:04:ca:7e:a9:2e:50:c9:17:01:52:ac:23:4e:
                    39:18:5e:5b:3f:31:b2:ca:72:02:f7:51:b9:9f:84:c6:
                    c3:a5:06:02:20:45:57:d5:a4:42:81:aa:74:c6:46:dc:
                    99:d5:2e:39:45:68:19:6f:26:50:d6:73:66:1c:f2:51:
                    21:9c:3f:f4:08:2a:75:64:bd:26:58:1a:64:3e:2f:f7:
                    8c:82:f1:81:36:cb:a6:af:dd:a9:e1:8a:91:47:bf:3a:
                    fe:dd:a2:60:39:ac:e4:0d:72:c3:dd:35:2b:eb:4e:96:
                    50:07:93:94:43:71:f6:be:1f:14:af:d1:10:44:a6:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:35:13:30:58:99:4f:ec:b9:ec:07:87:d9:57:ca:49:
        79:e1:96:c6:a3:14:02:4d:9d:49:d0:40:83:db:43:dd:
        4b:8e:1f:88:9f:7f:c3:56:3d:ea:86:6a:c1:94:72:01:
        32:5f:59:04:34:53:dc:87:2d:ec:7e:fc:8f:f4:87:54:
        11:78:a6:03:4c:77:af:39:75:6e:88:aa:6d:d3:b7:64:
        6d:f1:06:a4:75:96:e1:cb:70:50:c8:5f:7c:3f:dc:e5:
        c4:d9:cf:8b:20:49:6d:50:8d:93:52:c9:8b:79:db:4b:
        4e:96:ed:ee:4d:33:ec:d3:da:a9:b2:b4:26:01:e9:76
    Fingerprint (MD5):
        11:EE:22:75:77:73:D7:4F:7B:30:FD:24:0E:80:68:8D
    Fingerprint (SHA1):
        26:E7:24:76:AD:C6:C5:7F:24:00:93:A2:83:8B:EF:71:B7:CE:E6:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6034: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175171 (0x432f5403)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:00 2012
            Not After : Tue Nov 28 01:52:00 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:48:db:04:ca:7e:a9:2e:50:c9:17:01:52:ac:23:4e:
                    39:18:5e:5b:3f:31:b2:ca:72:02:f7:51:b9:9f:84:c6:
                    c3:a5:06:02:20:45:57:d5:a4:42:81:aa:74:c6:46:dc:
                    99:d5:2e:39:45:68:19:6f:26:50:d6:73:66:1c:f2:51:
                    21:9c:3f:f4:08:2a:75:64:bd:26:58:1a:64:3e:2f:f7:
                    8c:82:f1:81:36:cb:a6:af:dd:a9:e1:8a:91:47:bf:3a:
                    fe:dd:a2:60:39:ac:e4:0d:72:c3:dd:35:2b:eb:4e:96:
                    50:07:93:94:43:71:f6:be:1f:14:af:d1:10:44:a6:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:35:13:30:58:99:4f:ec:b9:ec:07:87:d9:57:ca:49:
        79:e1:96:c6:a3:14:02:4d:9d:49:d0:40:83:db:43:dd:
        4b:8e:1f:88:9f:7f:c3:56:3d:ea:86:6a:c1:94:72:01:
        32:5f:59:04:34:53:dc:87:2d:ec:7e:fc:8f:f4:87:54:
        11:78:a6:03:4c:77:af:39:75:6e:88:aa:6d:d3:b7:64:
        6d:f1:06:a4:75:96:e1:cb:70:50:c8:5f:7c:3f:dc:e5:
        c4:d9:cf:8b:20:49:6d:50:8d:93:52:c9:8b:79:db:4b:
        4e:96:ed:ee:4d:33:ec:d3:da:a9:b2:b4:26:01:e9:76
    Fingerprint (MD5):
        11:EE:22:75:77:73:D7:4F:7B:30:FD:24:0E:80:68:8D
    Fingerprint (SHA1):
        26:E7:24:76:AD:C6:C5:7F:24:00:93:A2:83:8B:EF:71:B7:CE:E6:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6035: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #6036: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175174 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6037: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #6038: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6039: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6040: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127175175   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6041: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #6042: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6043: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6044: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127175176   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6045: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6046: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6047: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6048: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127175177   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6049: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #6050: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #6051: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o User1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6052: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127175178   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6053: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #6054: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #6055: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o User2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6056: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127175179   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6057: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #6058: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #6059: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o User3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6060: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127175180   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6061: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #6062: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6063: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #6064: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #6065: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6066: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #6067: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175174 (0x432f5406)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:05 2012
            Not After : Tue Nov 28 01:52:05 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:42:98:75:b4:7a:af:e4:60:f1:3d:9c:43:21:36:e6:
                    da:d5:4e:46:55:33:bb:93:df:86:69:a9:7c:98:15:89:
                    e2:f4:7c:7d:36:c2:28:db:92:9a:2e:c5:04:f9:7d:94:
                    e9:64:5b:f6:05:5c:f3:95:a1:38:fb:a2:e8:1e:05:e5:
                    50:7f:61:3e:04:b5:b5:3f:5d:9d:c6:36:96:3b:a8:ee:
                    8d:4b:42:fa:5b:5f:f6:64:0a:13:60:45:5d:a7:ca:c4:
                    b9:c2:49:d3:57:05:c7:25:b1:29:67:41:65:95:fb:50:
                    4f:6b:18:32:05:da:ab:8f:f5:c0:98:e5:f4:98:99:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2b:11:21:f0:b1:93:0a:6b:4b:5c:64:8b:cd:2f:2d:a8:
        b5:63:43:50:06:99:e7:7e:88:02:24:73:0d:21:33:10:
        f6:6b:c8:b4:c7:b4:3b:5b:8d:c1:b2:fb:60:5d:3a:ca:
        e4:76:72:76:f9:1e:02:6b:5e:26:8d:fa:9a:a0:03:6f:
        d1:ad:e2:ae:94:61:ab:3f:ff:31:45:5d:95:f6:ff:ef:
        8f:9d:af:80:9b:90:88:2e:b7:4a:06:b7:90:7c:1c:26:
        a8:59:b4:a9:c3:57:96:2f:cd:e0:9d:83:c4:37:65:3b:
        75:5a:d8:a0:b4:0b:43:4e:12:2b:ec:9a:83:c5:45:19
    Fingerprint (MD5):
        E6:A8:38:5F:50:5E:DA:86:43:A2:B5:DC:92:7E:11:10
    Fingerprint (SHA1):
        D0:0D:1B:C8:A6:80:6A:4B:1D:68:A1:93:F1:51:47:C8:0A:B1:E6:07

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6068: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6069: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6070: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6071: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175174 (0x432f5406)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:05 2012
            Not After : Tue Nov 28 01:52:05 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:42:98:75:b4:7a:af:e4:60:f1:3d:9c:43:21:36:e6:
                    da:d5:4e:46:55:33:bb:93:df:86:69:a9:7c:98:15:89:
                    e2:f4:7c:7d:36:c2:28:db:92:9a:2e:c5:04:f9:7d:94:
                    e9:64:5b:f6:05:5c:f3:95:a1:38:fb:a2:e8:1e:05:e5:
                    50:7f:61:3e:04:b5:b5:3f:5d:9d:c6:36:96:3b:a8:ee:
                    8d:4b:42:fa:5b:5f:f6:64:0a:13:60:45:5d:a7:ca:c4:
                    b9:c2:49:d3:57:05:c7:25:b1:29:67:41:65:95:fb:50:
                    4f:6b:18:32:05:da:ab:8f:f5:c0:98:e5:f4:98:99:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2b:11:21:f0:b1:93:0a:6b:4b:5c:64:8b:cd:2f:2d:a8:
        b5:63:43:50:06:99:e7:7e:88:02:24:73:0d:21:33:10:
        f6:6b:c8:b4:c7:b4:3b:5b:8d:c1:b2:fb:60:5d:3a:ca:
        e4:76:72:76:f9:1e:02:6b:5e:26:8d:fa:9a:a0:03:6f:
        d1:ad:e2:ae:94:61:ab:3f:ff:31:45:5d:95:f6:ff:ef:
        8f:9d:af:80:9b:90:88:2e:b7:4a:06:b7:90:7c:1c:26:
        a8:59:b4:a9:c3:57:96:2f:cd:e0:9d:83:c4:37:65:3b:
        75:5a:d8:a0:b4:0b:43:4e:12:2b:ec:9a:83:c5:45:19
    Fingerprint (MD5):
        E6:A8:38:5F:50:5E:DA:86:43:A2:B5:DC:92:7E:11:10
    Fingerprint (SHA1):
        D0:0D:1B:C8:A6:80:6A:4B:1D:68:A1:93:F1:51:47:C8:0A:B1:E6:07

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6072: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6073: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #6074: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175181 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6075: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #6076: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6077: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6078: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127175182   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6079: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #6080: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #6081: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6082: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127175183   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6083: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #6084: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #6085: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA13Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6086: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127175184   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6087: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #6088: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6089: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6090: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127175185   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6091: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #6092: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #6093: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA22Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6094: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127175186   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6095: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #6096: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #6097: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA23Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6098: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127175187   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6099: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #6100: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6101: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6102: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127175188   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6103: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #6104: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #6105: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA32Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6106: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127175189   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6107: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #6108: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #6109: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA33Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6110: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127175190   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6111: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #6112: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #6113: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6114: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127175191   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6115: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #6116: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #6117: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA42Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6118: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127175192   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6119: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #6120: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #6121: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA43Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6122: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127175193   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6123: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #6124: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #6125: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6126: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127175194   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6127: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #6128: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #6129: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA52Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6130: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127175195   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6131: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #6132: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #6133: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA53Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6134: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127175196   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6135: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #6136: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #6137: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE5Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6138: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127175197   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6139: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #6140: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #6141: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA61Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6142: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127175198   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6143: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #6144: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #6145: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA62Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6146: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127175199   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6147: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #6148: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #6149: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE62Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6150: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127175200   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6151: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #6152: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #6153: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA63Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6154: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127175201   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6155: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #6156: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #6157: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE63Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6158: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127175202   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6159: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #6160: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #6161: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA64Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6162: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127175203   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6163: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #6164: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #6165: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE64Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6166: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127175204   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6167: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #6168: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #6169: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA65Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6170: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127175205   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6171: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #6172: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #6173: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE65Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6174: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127175206   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6175: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #6176: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #6177: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA66Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6178: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127175207   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6179: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #6180: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #6181: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE66Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6182: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127175208   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6183: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #6184: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #6185: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA67Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6186: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127175209   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6187: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #6188: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #6189: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE67Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6190: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127175210   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6191: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #6192: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6193: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6194: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6195: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6196: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6197: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6198: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6199: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6200: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6201: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6202: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6203: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6204: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6205: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6206: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6207: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6208: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6209: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6210: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6211: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6212: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6213: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6214: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6215: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175181 (0x432f540d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:10 2012
            Not After : Tue Nov 28 01:52:10 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:2b:81:65:95:7f:f8:7c:70:fb:3c:4c:4a:6a:16:ee:
                    72:0d:ec:95:99:e3:65:6c:fb:95:e4:b1:f8:bc:02:ab:
                    2a:1e:ff:fb:27:19:10:4d:24:4a:24:2d:14:b6:80:02:
                    8b:03:28:90:79:e9:9f:7d:ef:85:8a:09:47:a7:8e:3a:
                    96:e2:9f:63:be:cf:8a:fd:d6:aa:47:14:ce:78:4a:93:
                    4e:f8:02:31:4b:7c:24:1d:a3:3f:d6:bd:60:74:bc:61:
                    29:92:cb:a2:f1:f1:0e:3b:41:0f:f5:e8:35:cb:1a:7f:
                    ff:99:38:a6:79:63:ef:2f:9c:1a:da:28:4b:cd:f4:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5f:8a:dd:6b:f9:76:73:89:a0:52:a6:77:c1:98:5c:a1:
        b7:8a:7e:07:09:7b:e8:1a:35:20:f1:37:9a:ac:c8:51:
        d9:50:80:c4:07:26:e4:c3:8c:9c:ce:23:f6:83:82:a6:
        e9:11:86:42:87:68:47:65:2c:b9:8c:9d:7a:f8:4a:36:
        25:9d:05:13:45:02:ca:38:ff:b7:b9:09:eb:59:3d:45:
        9b:6c:0e:46:39:75:60:4f:91:c5:de:c5:45:e6:13:b3:
        62:96:82:80:e8:6a:d7:c9:96:d0:38:4b:95:5b:fb:25:
        ef:5d:44:d1:af:1b:d4:8d:d0:c2:43:d4:27:69:47:bc
    Fingerprint (MD5):
        D7:F5:D3:9D:BE:48:CD:0B:D5:2B:B4:3A:AA:60:2F:6A
    Fingerprint (SHA1):
        95:5D:45:EF:50:29:9D:CB:DB:50:EB:4E:A9:EE:2E:B9:8C:8E:64:63


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6216: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6217: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6218: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175211 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6219: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6220: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #6221: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o nonEVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6222: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127175212   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6223: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #6224: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #6225: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6226: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127175213   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6227: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #6228: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #6229: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o otherEVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6230: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127175214   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6231: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #6232: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #6233: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o validEVReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6234: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127175215   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6235: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #6236: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #6237: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o invalidEVReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6238: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127175216   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6239: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #6240: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #6241: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o wrongEVOIDReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6242: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127175217   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6243: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #6244: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6245: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175211 (0x432f542b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:34 2012
            Not After : Tue Nov 28 01:52:34 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:22:8b:83:d5:8f:04:79:8a:8b:dc:ac:60:b0:08:2a:
                    6f:08:72:94:c5:d0:ae:90:0a:95:23:b4:50:85:8d:8b:
                    92:4a:90:fe:10:e4:b0:10:da:48:b2:47:ce:a4:22:fb:
                    a4:46:fd:8a:89:8e:ea:ea:a4:1f:6f:bb:03:a0:24:37:
                    ad:f9:fe:27:8e:8b:0b:56:72:00:9b:d2:ee:14:64:4a:
                    d5:f3:01:1f:01:2e:e3:a3:4b:ce:88:42:99:32:78:1f:
                    b2:ca:a4:62:53:bb:04:2e:db:91:49:54:fe:83:d6:36:
                    ee:e2:5c:fc:87:88:73:e9:50:80:80:3d:13:96:e8:11
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:fd:c1:fa:af:54:f4:f2:cc:03:26:78:66:ce:34:6c:
        a7:92:2d:82:36:08:66:74:b3:85:97:67:65:1a:ad:f0:
        b7:6f:38:a6:39:3e:32:4c:e6:63:f6:df:3e:be:36:39:
        8e:99:b0:ec:21:8c:bc:73:2b:46:b4:19:87:b5:86:ed:
        df:ce:b1:e5:40:53:ad:a5:f8:98:20:cb:03:53:f1:f9:
        18:ac:1a:01:7b:2c:0f:16:a0:39:52:04:d0:f4:27:b9:
        0a:07:fc:d7:40:72:76:99:c7:e4:37:db:5f:62:3d:b8:
        f5:38:25:75:b6:e4:40:36:b5:a7:69:6a:6e:8e:83:c1
    Fingerprint (MD5):
        C5:B4:B4:1B:D2:A7:A6:8C:94:7C:D0:B1:83:DC:7E:C2
    Fingerprint (SHA1):
        CF:FE:62:8A:93:79:89:E7:7B:59:72:8A:44:9F:E7:5C:6A:8D:3C:F5


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #6246: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6247: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6248: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6249: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175211 (0x432f542b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:34 2012
            Not After : Tue Nov 28 01:52:34 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:22:8b:83:d5:8f:04:79:8a:8b:dc:ac:60:b0:08:2a:
                    6f:08:72:94:c5:d0:ae:90:0a:95:23:b4:50:85:8d:8b:
                    92:4a:90:fe:10:e4:b0:10:da:48:b2:47:ce:a4:22:fb:
                    a4:46:fd:8a:89:8e:ea:ea:a4:1f:6f:bb:03:a0:24:37:
                    ad:f9:fe:27:8e:8b:0b:56:72:00:9b:d2:ee:14:64:4a:
                    d5:f3:01:1f:01:2e:e3:a3:4b:ce:88:42:99:32:78:1f:
                    b2:ca:a4:62:53:bb:04:2e:db:91:49:54:fe:83:d6:36:
                    ee:e2:5c:fc:87:88:73:e9:50:80:80:3d:13:96:e8:11
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:fd:c1:fa:af:54:f4:f2:cc:03:26:78:66:ce:34:6c:
        a7:92:2d:82:36:08:66:74:b3:85:97:67:65:1a:ad:f0:
        b7:6f:38:a6:39:3e:32:4c:e6:63:f6:df:3e:be:36:39:
        8e:99:b0:ec:21:8c:bc:73:2b:46:b4:19:87:b5:86:ed:
        df:ce:b1:e5:40:53:ad:a5:f8:98:20:cb:03:53:f1:f9:
        18:ac:1a:01:7b:2c:0f:16:a0:39:52:04:d0:f4:27:b9:
        0a:07:fc:d7:40:72:76:99:c7:e4:37:db:5f:62:3d:b8:
        f5:38:25:75:b6:e4:40:36:b5:a7:69:6a:6e:8e:83:c1
    Fingerprint (MD5):
        C5:B4:B4:1B:D2:A7:A6:8C:94:7C:D0:B1:83:DC:7E:C2
    Fingerprint (SHA1):
        CF:FE:62:8A:93:79:89:E7:7B:59:72:8A:44:9F:E7:5C:6A:8D:3C:F5

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #6250: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6251: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6252: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6253: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175218 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6254: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6255: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6256: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6257: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127175219   --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6258: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6259: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6260: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6261: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127175220   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6262: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6263: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6264: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6265: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127175221   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6266: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6267: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6268: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6269: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6270: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6271: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175218 (0x432f5432)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:40 2012
            Not After : Tue Nov 28 01:52:40 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:b0:0c:46:95:7c:a2:78:c3:3d:a1:2a:3f:fa:62:db:
                    9e:40:78:9b:76:62:d0:05:41:94:fb:25:31:6b:50:41:
                    52:4e:3a:67:98:a7:62:31:22:0f:54:ac:3f:65:3a:5a:
                    4e:f2:ee:2b:c6:b2:09:fb:ea:23:e1:67:ae:90:26:f9:
                    61:46:4a:d3:bb:74:55:f9:34:c3:71:46:f9:1f:87:19:
                    a6:fa:11:40:14:b7:e9:a3:01:fb:75:16:79:e2:8f:cf:
                    13:11:51:94:67:0a:df:be:cc:cb:2d:3d:8c:c1:58:fd:
                    1e:c2:73:a6:c2:dc:2d:3e:d6:a3:3d:18:af:5e:db:39
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:ba:4c:ec:4a:6f:19:03:a2:c2:0a:bc:a8:2d:39:61:
        da:c5:52:40:15:42:83:21:6e:fe:ee:dc:d5:db:b6:79:
        3c:b3:11:e6:28:b2:03:79:db:75:a3:ef:8a:f8:83:27:
        9c:11:8b:83:8f:03:15:fa:1b:ba:be:e7:83:85:94:b9:
        ea:75:73:03:cd:8d:8e:cc:03:4d:00:df:33:ad:65:83:
        22:d1:67:5c:58:85:77:5e:72:3c:92:99:63:3e:9c:66:
        23:8e:b6:b3:f1:25:c1:db:9c:6a:80:86:7e:5b:c6:45:
        86:ad:86:e9:8c:1a:43:06:3a:9b:71:d0:38:01:aa:00
    Fingerprint (MD5):
        8B:D3:5F:50:85:79:0B:7E:E6:52:D4:95:59:A4:92:67
    Fingerprint (SHA1):
        AC:6A:FC:52:28:9B:1F:10:0F:13:AC:F6:BD:E4:8B:B4:71:6E:F0:46

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6272: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6273: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6274: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175219 (0x432f5433)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:41 2012
            Not After : Tue Nov 28 01:52:41 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:20:e7:05:80:5d:96:22:62:9f:81:01:b4:3d:ce:14:
                    5c:74:75:f9:ae:64:d6:e9:2c:f5:ac:52:e1:44:42:62:
                    45:51:53:54:7c:ad:59:68:a6:e8:70:1f:da:a2:a7:c5:
                    a5:bb:42:42:35:6e:5a:6e:cd:a1:90:52:cd:b6:96:79:
                    4f:89:75:82:88:bc:3b:33:91:08:3e:16:e8:c4:d0:a3:
                    a1:c8:01:46:de:01:93:07:68:45:53:3a:a4:c5:6f:b6:
                    f0:81:50:5b:64:01:16:d2:72:21:0e:73:45:e6:69:0b:
                    1a:e9:59:98:06:bc:1f:72:d8:ef:4f:e5:25:79:50:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:17:95:d0:3e:a2:d6:69:56:57:69:4a:78:17:0b:cc:
        1e:2c:7e:16:00:89:27:3b:70:5a:d8:bc:f0:3e:b1:5a:
        d8:45:0f:0a:27:2a:e5:71:c9:e9:03:46:9e:e0:4f:3b:
        b1:16:00:68:48:63:6e:3a:6f:65:70:ce:f0:f5:09:94:
        8f:6f:95:43:a8:8b:22:18:0e:65:43:e2:ec:fc:c7:2c:
        5e:27:13:3a:c2:08:57:7a:be:c4:6b:7d:5d:8b:4c:cf:
        0b:07:84:b6:5f:8f:3e:c3:61:6a:ea:30:f7:1d:2a:b3:
        f3:5f:a1:81:33:56:1c:6d:86:c4:ba:90:1f:59:d1:97
    Fingerprint (MD5):
        8A:6E:6B:FB:21:7B:31:C1:80:48:11:CE:A5:54:99:85
    Fingerprint (SHA1):
        81:A5:C7:8F:B6:38:E8:E4:9C:0B:60:CC:6C:CC:81:C0:4E:94:8C:45

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6275: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6276: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175220 (0x432f5434)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:41 2012
            Not After : Tue Nov 28 01:52:41 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:57:0f:25:09:32:cd:23:5b:59:fb:72:1a:80:87:33:
                    77:0a:ab:c6:4b:0e:63:36:61:7d:48:60:8b:70:36:57:
                    d5:fa:12:26:8d:27:a0:79:3b:e1:60:23:ca:0e:15:8e:
                    9f:16:bf:df:33:5f:d7:63:e8:30:62:95:b5:5f:26:0c:
                    ea:49:14:4b:02:b9:83:ba:f1:88:f6:68:4e:3e:5c:23:
                    6c:c3:a0:74:57:27:5c:7a:c2:26:2e:4e:a4:a8:30:09:
                    04:60:83:71:a4:63:bb:92:b5:55:94:4a:05:47:37:e8:
                    53:70:9c:68:54:36:e9:75:df:ff:e4:07:55:e3:51:a5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:b4:c9:5d:35:46:ab:21:95:a7:be:9c:e7:17:0e:33:
        c9:f4:31:f6:12:da:f1:15:40:03:03:09:b5:ff:da:fc:
        50:35:81:46:2f:4d:5e:16:5d:31:ea:d1:c5:fe:7d:1a:
        c6:c6:5a:2b:40:89:92:0d:a9:e3:cd:61:5f:66:a5:8d:
        a1:2a:c2:dc:04:94:88:a8:3f:a2:57:05:6f:98:e6:b6:
        a9:9b:81:14:32:7d:f7:4c:45:46:c3:22:83:08:7f:3e:
        f2:76:d3:27:52:ed:62:b7:75:33:c0:77:e8:c3:24:2c:
        97:17:b4:86:a2:6d:98:a1:01:c9:28:1e:e5:0a:d6:7e
    Fingerprint (MD5):
        4C:94:5C:F8:E1:E3:C4:9A:F2:92:4B:DE:15:B9:83:A6
    Fingerprint (SHA1):
        0E:8D:CD:F0:1F:73:F5:85:12:62:EA:58:06:E6:B2:9C:5D:E4:75:7A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6277: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6278: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175222 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6279: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6280: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6281: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6282: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127175223   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6283: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6284: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6285: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6286: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127175224   --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6287: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6288: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6289: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6290: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127175225   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6291: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #6292: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6293: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6294: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127175226   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6295: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #6296: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6297: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6298: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6299: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6300: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #6301: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175222 (0x432f5436)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:44 2012
            Not After : Tue Nov 28 01:52:44 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:c1:15:be:05:b4:43:75:bc:3c:41:c1:b3:91:71:12:
                    54:94:74:6f:07:a9:69:10:25:4a:5c:ff:3d:5d:ca:06:
                    04:ab:62:e5:ae:7d:45:cc:f2:a6:16:a8:40:a9:3d:a9:
                    29:b5:c8:91:57:cc:da:4c:21:f8:f0:27:d5:10:12:2f:
                    60:82:ac:c2:51:85:08:08:65:74:95:25:f3:13:1e:37:
                    6d:66:7c:a1:ac:d9:5d:b6:46:29:63:ec:6e:a9:d0:4d:
                    88:91:66:7e:a3:00:bd:0c:49:6d:0e:db:9b:7a:f2:04:
                    8f:b6:f2:65:e9:4f:37:98:98:58:a3:59:8f:66:b6:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:50:00:78:38:dc:9a:f3:50:c3:d4:c8:65:23:96:e2:
        79:d8:73:73:1b:8c:4d:c0:ce:af:ef:b8:2b:4e:2a:6c:
        db:46:72:46:be:7e:9a:6e:6b:2c:18:f8:63:57:e4:b6:
        8c:ea:61:14:c2:1c:a9:4b:d4:8b:86:25:42:56:dd:c6:
        a4:f3:a3:fa:d0:e5:ae:73:2b:c4:9a:bf:a4:3c:a5:4c:
        1c:91:5c:76:45:15:ad:75:f7:14:de:2f:aa:de:a7:df:
        af:d7:97:88:80:9c:1c:c8:42:ae:33:6c:65:87:31:94:
        ef:23:b7:dd:2d:bd:01:18:6e:74:4c:2a:4f:9a:75:6f
    Fingerprint (MD5):
        FF:01:D9:D5:4C:C5:07:D8:21:08:AE:A6:5F:40:E3:8A
    Fingerprint (SHA1):
        B4:A9:9E:3F:BE:BF:26:F1:AF:BA:E1:B0:A1:A2:16:BB:18:7E:BC:EA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6302: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6303: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175223 (0x432f5437)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:45 2012
            Not After : Tue Nov 28 01:52:45 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:bf:df:ef:1f:9a:ea:a1:52:94:8f:db:1e:6c:5b:c7:
                    5e:78:05:e2:c0:51:b9:dd:f7:bd:62:e0:b1:32:21:11:
                    3f:01:95:26:6f:4b:69:3c:25:a2:48:e7:6e:fe:0c:b6:
                    9e:8b:10:70:93:ec:40:3b:d7:1b:4b:89:37:3a:fb:76:
                    a5:6e:5f:12:2e:b5:69:72:d5:20:9e:ef:cc:e8:1a:43:
                    fd:ec:38:99:0f:03:5f:ca:d2:ea:95:7e:47:a9:78:01:
                    6f:a6:ef:94:c7:98:20:1a:1e:cd:ee:6c:c9:6c:9f:2a:
                    a2:06:5e:b0:93:5d:ab:13:6c:96:37:00:34:92:15:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ab:99:e7:96:cb:3f:2b:7a:aa:5f:3f:e7:59:bc:15:28:
        84:49:11:9f:4e:6c:45:c0:b0:fd:2a:45:c8:04:bf:c5:
        cf:1f:7c:3a:02:5f:17:f1:03:aa:7f:93:7d:74:50:0e:
        14:7b:31:99:39:f6:79:a9:05:8c:62:c8:1b:67:6f:de:
        29:79:3d:3d:54:50:2c:0a:18:28:04:84:b7:7a:90:be:
        96:a1:69:30:77:13:48:44:ff:cb:26:d5:45:11:64:fb:
        c1:dc:02:9e:0f:62:0d:72:77:f6:bb:f7:da:13:21:69:
        88:9a:a8:5b:a3:52:95:69:e2:42:8a:14:2e:cb:e6:09
    Fingerprint (MD5):
        96:8C:5B:85:71:0D:EA:63:6C:5E:15:BC:7F:38:CA:52
    Fingerprint (SHA1):
        42:31:98:BB:E9:91:C4:75:FA:92:E1:5C:48:F3:94:C3:A5:4D:D2:9E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6304: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6305: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6306: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175224 (0x432f5438)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:45 2012
            Not After : Tue Nov 28 01:52:45 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:76:49:bd:5a:45:37:67:ea:b0:4f:f5:bc:7b:fb:14:
                    8a:d8:51:b1:7d:1a:71:78:7d:8c:cd:92:37:6f:20:8c:
                    95:64:7c:f4:70:30:1b:85:1d:95:ae:63:6e:8b:42:a9:
                    43:df:aa:24:3e:dd:25:b3:e9:bb:b6:ea:7c:e8:6e:80:
                    b5:7f:62:40:f3:18:e8:b3:cd:5b:8b:1f:46:8a:8d:45:
                    87:f6:16:2f:f0:9a:2a:41:1b:e0:14:c5:7e:ff:d7:76:
                    34:3b:9b:72:ff:e0:eb:aa:3e:6c:75:87:b6:e8:ae:e6:
                    eb:dd:16:7b:2e:2e:c8:89:da:b7:7a:2a:ee:a0:78:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:10:6b:be:ec:fe:c5:a9:23:f0:c2:5b:3d:c8:8d:0a:
        70:f7:dd:72:68:fb:7b:70:b0:db:98:f5:f3:74:d9:bb:
        b1:c6:27:1d:4e:d8:05:6c:db:23:1a:e0:22:22:dd:d6:
        cd:ee:b1:6c:54:3a:80:5a:d7:11:bd:88:0a:ad:c5:c2:
        46:69:86:4f:c4:e7:77:7d:ed:3d:a7:b6:00:af:24:cf:
        53:19:14:f9:f6:a0:98:16:c0:94:c4:84:01:d2:30:7b:
        8b:62:de:70:26:05:15:24:32:7c:8f:af:5c:8d:6c:9f:
        cb:60:46:0e:92:7e:97:26:ce:0f:bd:7e:c5:f4:b8:8c
    Fingerprint (MD5):
        CB:9E:34:25:55:AD:AE:76:33:7A:DF:F4:92:E5:75:57
    Fingerprint (SHA1):
        69:84:CD:C1:1C:5D:6E:30:F0:99:75:F7:29:75:21:38:EA:16:6C:12

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6307: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6308: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175227 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6309: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6310: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6311: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6312: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127175228   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6313: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6314: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6315: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6316: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127175229   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA1Root-1127175137.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6317: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6318: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6319: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6320: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127175230   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6321: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6322: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #6323: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175227 (0x432f543b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:49 2012
            Not After : Tue Nov 28 01:52:49 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f4:85:e4:2e:7b:d0:3a:d5:66:e4:7a:e4:93:fb:f5:87:
                    f6:64:a5:72:16:43:bf:ea:bb:c6:f9:3c:e8:5d:ad:2a:
                    14:3f:28:83:99:fb:05:6b:a0:4b:79:18:9e:0f:82:f2:
                    09:4e:c8:45:a8:da:67:bf:26:37:3f:8a:53:83:e3:b8:
                    a3:d5:2b:69:cf:92:0d:46:7d:b6:2c:1c:54:13:bb:7e:
                    51:e0:bc:c4:5a:bc:65:11:ce:d1:5e:27:43:11:ef:6e:
                    93:2e:58:ff:88:5e:c5:c9:12:6d:1e:85:e9:f6:4d:7d:
                    46:1b:09:ac:ab:97:12:e1:ea:cf:6d:cc:8a:cd:92:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:d9:ea:6a:ec:89:01:74:fb:5f:df:10:96:ae:21:f0:
        03:7d:2b:8f:10:6d:b4:8c:2f:a0:00:ea:e7:af:6d:5a:
        29:e5:7e:0d:a2:de:f2:1a:aa:fe:87:b9:56:0d:47:c2:
        30:9e:cb:55:41:95:7f:ce:10:1e:19:02:35:fd:e1:13:
        42:f2:3c:0d:3f:b6:cb:a3:00:ad:57:49:89:63:21:5d:
        3e:90:59:7d:31:0c:a5:24:8e:fa:15:49:98:95:e3:66:
        ec:6c:7d:25:66:83:74:6e:18:69:7a:78:ef:a4:6d:57:
        10:48:7b:59:83:c3:73:b5:2f:47:a6:22:7d:8a:75:7f
    Fingerprint (MD5):
        A4:B8:3D:1C:43:83:45:01:5F:7C:49:D4:7B:9F:EC:44
    Fingerprint (SHA1):
        4E:7F:37:EB:83:C8:D9:C4:C1:C7:3E:1B:67:C9:30:7E:5D:32:48:75


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6324: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6325: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175231 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6326: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6327: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6328: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175232 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6329: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6330: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6331: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6332: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127175233 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6333: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6334: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127175234 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6335: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6336: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6337: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6338: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6339: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127175235   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-Bridge-1127175138.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6340: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6341: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6342: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6343: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127175236   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6344: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6345: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6346: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6347: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175232 (0x432f5440)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:52 2012
            Not After : Tue Nov 28 01:52:52 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:0c:d9:76:b2:7c:9a:ff:ce:73:e3:91:41:be:9b:17:
                    de:d8:d5:34:46:5a:5a:4a:da:4c:15:a1:c9:b9:04:49:
                    2a:54:bd:e3:26:d5:d4:f4:44:bb:e5:a7:59:50:0c:af:
                    b8:b2:d0:60:4a:6b:25:13:f8:4c:69:a1:bd:4d:04:a2:
                    4b:d5:9f:1e:1d:5b:66:76:6c:a8:10:d6:da:c2:c6:44:
                    58:d5:8b:41:8c:23:d2:da:5b:09:3b:f4:c1:a1:a6:37:
                    4d:91:f1:8f:dc:0a:88:90:2c:cf:d6:a8:64:8e:ae:e1:
                    8b:79:b0:04:3d:2e:16:16:d2:55:c1:04:9f:1d:f1:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:4e:16:fa:0f:f0:3b:5e:56:cf:dd:a5:ac:6b:c3:d2:
        76:03:8a:96:7b:7e:46:86:2e:33:c4:23:1f:7b:e7:1f:
        c8:1c:1f:31:3d:a1:de:4c:24:b2:33:52:83:80:b2:0f:
        d0:39:c3:88:83:5c:c4:9e:a0:3f:33:11:f6:d9:2d:63:
        82:a3:81:39:02:15:cb:8d:ff:07:ef:f9:b9:40:7a:e9:
        bb:90:c3:b9:f2:56:9f:fd:54:4a:ba:43:66:f6:0c:ab:
        98:b5:55:2c:56:ca:86:a4:d6:10:58:58:71:6f:35:e9:
        f9:b0:41:b3:31:df:40:40:d2:f7:a5:c3:cf:36:6d:aa
    Fingerprint (MD5):
        38:77:48:CF:F7:43:45:7A:3C:54:9D:D1:F2:1B:00:23
    Fingerprint (SHA1):
        ED:75:D6:1A:5E:60:81:B5:0A:C2:1A:51:51:BA:EA:26:15:6F:45:4E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6348: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175232 (0x432f5440)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:52 2012
            Not After : Tue Nov 28 01:52:52 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:0c:d9:76:b2:7c:9a:ff:ce:73:e3:91:41:be:9b:17:
                    de:d8:d5:34:46:5a:5a:4a:da:4c:15:a1:c9:b9:04:49:
                    2a:54:bd:e3:26:d5:d4:f4:44:bb:e5:a7:59:50:0c:af:
                    b8:b2:d0:60:4a:6b:25:13:f8:4c:69:a1:bd:4d:04:a2:
                    4b:d5:9f:1e:1d:5b:66:76:6c:a8:10:d6:da:c2:c6:44:
                    58:d5:8b:41:8c:23:d2:da:5b:09:3b:f4:c1:a1:a6:37:
                    4d:91:f1:8f:dc:0a:88:90:2c:cf:d6:a8:64:8e:ae:e1:
                    8b:79:b0:04:3d:2e:16:16:d2:55:c1:04:9f:1d:f1:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:4e:16:fa:0f:f0:3b:5e:56:cf:dd:a5:ac:6b:c3:d2:
        76:03:8a:96:7b:7e:46:86:2e:33:c4:23:1f:7b:e7:1f:
        c8:1c:1f:31:3d:a1:de:4c:24:b2:33:52:83:80:b2:0f:
        d0:39:c3:88:83:5c:c4:9e:a0:3f:33:11:f6:d9:2d:63:
        82:a3:81:39:02:15:cb:8d:ff:07:ef:f9:b9:40:7a:e9:
        bb:90:c3:b9:f2:56:9f:fd:54:4a:ba:43:66:f6:0c:ab:
        98:b5:55:2c:56:ca:86:a4:d6:10:58:58:71:6f:35:e9:
        f9:b0:41:b3:31:df:40:40:d2:f7:a5:c3:cf:36:6d:aa
    Fingerprint (MD5):
        38:77:48:CF:F7:43:45:7A:3C:54:9D:D1:F2:1B:00:23
    Fingerprint (SHA1):
        ED:75:D6:1A:5E:60:81:B5:0A:C2:1A:51:51:BA:EA:26:15:6F:45:4E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6349: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6350: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175237 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6351: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6352: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6353: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175238 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6354: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6355: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6356: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6357: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127175239 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6358: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6359: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127175240 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6360: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6361: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6362: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6363: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6364: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127175241   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-Bridge-1127175139.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6365: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6366: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6367: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6368: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127175242   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6369: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6370: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6371: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6372: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127175243   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-BridgeNavy-1127175140.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6373: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #6374: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6375: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6376: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127175244   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6377: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6378: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6379: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6380: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175238 (0x432f5446)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:56 2012
            Not After : Tue Nov 28 01:52:56 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:43:7d:87:36:6c:f7:e1:d1:33:c0:3a:5a:99:a6:c1:
                    70:c1:fb:25:02:3f:8e:bc:36:2e:d8:a0:1a:ec:05:34:
                    6b:28:e3:e0:24:1d:92:6c:bc:f8:db:23:ef:09:ac:44:
                    70:39:27:c2:37:e7:47:ec:4a:ce:68:94:6f:1d:33:89:
                    ed:32:e9:9e:6c:9b:03:cb:f0:20:2a:3a:6f:12:3a:eb:
                    2c:20:6c:26:5c:eb:0b:83:dc:21:00:6a:96:b4:c0:66:
                    fb:fd:d4:d2:9c:37:04:c8:36:f3:ea:a9:33:a6:82:9f:
                    70:da:b8:25:19:5e:96:d4:69:2d:69:a2:91:4e:a2:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:25:04:3e:ce:2f:85:16:df:20:a7:74:10:46:39:94:
        30:d0:b3:00:07:e6:c6:ce:7b:b3:a6:a2:6d:40:55:08:
        70:c8:9a:8b:54:1e:7b:9f:57:51:6b:ed:72:e4:ed:45:
        6a:4a:75:9d:a3:03:76:a9:99:a1:b5:0e:b8:0d:e2:e8:
        9c:1a:5c:17:18:fb:c9:5e:5c:6d:45:a0:e5:81:e3:45:
        cd:d9:23:9a:0c:b4:ee:98:39:04:09:00:7a:12:c2:7c:
        37:43:46:92:93:d9:23:dc:91:a3:75:7e:6a:7e:9b:56:
        d8:e6:65:8d:a4:06:b3:88:39:c6:95:11:fe:67:0e:4c
    Fingerprint (MD5):
        E3:65:B8:05:E5:B0:57:D0:E1:FE:2E:E5:65:D9:8E:09
    Fingerprint (SHA1):
        3F:C0:9B:AD:B5:2A:78:9E:D2:57:9D:F3:55:01:54:80:AD:B2:96:E6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6381: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175238 (0x432f5446)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:56 2012
            Not After : Tue Nov 28 01:52:56 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:43:7d:87:36:6c:f7:e1:d1:33:c0:3a:5a:99:a6:c1:
                    70:c1:fb:25:02:3f:8e:bc:36:2e:d8:a0:1a:ec:05:34:
                    6b:28:e3:e0:24:1d:92:6c:bc:f8:db:23:ef:09:ac:44:
                    70:39:27:c2:37:e7:47:ec:4a:ce:68:94:6f:1d:33:89:
                    ed:32:e9:9e:6c:9b:03:cb:f0:20:2a:3a:6f:12:3a:eb:
                    2c:20:6c:26:5c:eb:0b:83:dc:21:00:6a:96:b4:c0:66:
                    fb:fd:d4:d2:9c:37:04:c8:36:f3:ea:a9:33:a6:82:9f:
                    70:da:b8:25:19:5e:96:d4:69:2d:69:a2:91:4e:a2:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:25:04:3e:ce:2f:85:16:df:20:a7:74:10:46:39:94:
        30:d0:b3:00:07:e6:c6:ce:7b:b3:a6:a2:6d:40:55:08:
        70:c8:9a:8b:54:1e:7b:9f:57:51:6b:ed:72:e4:ed:45:
        6a:4a:75:9d:a3:03:76:a9:99:a1:b5:0e:b8:0d:e2:e8:
        9c:1a:5c:17:18:fb:c9:5e:5c:6d:45:a0:e5:81:e3:45:
        cd:d9:23:9a:0c:b4:ee:98:39:04:09:00:7a:12:c2:7c:
        37:43:46:92:93:d9:23:dc:91:a3:75:7e:6a:7e:9b:56:
        d8:e6:65:8d:a4:06:b3:88:39:c6:95:11:fe:67:0e:4c
    Fingerprint (MD5):
        E3:65:B8:05:E5:B0:57:D0:E1:FE:2E:E5:65:D9:8E:09
    Fingerprint (SHA1):
        3F:C0:9B:AD:B5:2A:78:9E:D2:57:9D:F3:55:01:54:80:AD:B2:96:E6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6382: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #6383: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175237 (0x432f5445)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:56 2012
            Not After : Tue Nov 28 01:52:56 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:71:23:78:f3:3d:28:21:4d:03:43:ee:58:52:af:ad:
                    2f:4f:96:82:b2:3c:d5:49:66:be:c2:30:c6:67:92:e7:
                    f6:48:16:a0:d2:d5:61:d5:1a:a5:2e:ff:8e:03:43:76:
                    ea:5a:9e:52:94:a6:ed:56:1e:6e:bf:ed:c6:a4:5e:4c:
                    76:c9:4b:dd:f7:bc:b4:7f:a7:6f:65:a6:3d:fa:ee:1b:
                    c6:0b:e2:86:35:0b:63:e3:60:29:5e:c0:b5:60:bf:91:
                    8c:f6:80:b5:ad:02:e8:5a:ab:64:ec:cf:db:cd:02:68:
                    4c:8a:03:8f:87:bf:8b:c5:bc:20:f9:9d:d0:63:18:db
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        79:ed:a1:a3:b5:9a:22:cd:93:f9:80:fe:ae:9b:29:d7:
        91:b4:51:1e:83:66:21:92:f7:b0:05:68:6a:44:8e:fa:
        ca:a9:b4:a4:b5:46:27:6a:b2:e4:23:58:6a:f8:55:30:
        1e:df:04:aa:25:4f:b4:22:16:65:67:fd:8a:36:66:7a:
        3c:53:cd:d3:62:0c:b2:e2:3d:f8:7f:7d:47:1a:90:58:
        ba:4c:17:e8:48:e8:ab:6d:fe:fc:1b:b4:43:9e:0e:28:
        5c:71:c6:f1:48:f1:17:93:fd:ee:fe:27:12:e1:3b:94:
        8e:01:0b:e3:25:04:c0:1d:d0:0a:c0:b9:eb:36:56:11
    Fingerprint (MD5):
        D4:1F:08:6D:0A:16:ED:1B:75:73:16:E5:72:62:53:FF
    Fingerprint (SHA1):
        5A:39:37:3C:ED:D7:13:D2:F5:14:DA:44:24:9B:36:FB:D3:7F:F1:E6


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6384: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175238 (0x432f5446)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:56 2012
            Not After : Tue Nov 28 01:52:56 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:43:7d:87:36:6c:f7:e1:d1:33:c0:3a:5a:99:a6:c1:
                    70:c1:fb:25:02:3f:8e:bc:36:2e:d8:a0:1a:ec:05:34:
                    6b:28:e3:e0:24:1d:92:6c:bc:f8:db:23:ef:09:ac:44:
                    70:39:27:c2:37:e7:47:ec:4a:ce:68:94:6f:1d:33:89:
                    ed:32:e9:9e:6c:9b:03:cb:f0:20:2a:3a:6f:12:3a:eb:
                    2c:20:6c:26:5c:eb:0b:83:dc:21:00:6a:96:b4:c0:66:
                    fb:fd:d4:d2:9c:37:04:c8:36:f3:ea:a9:33:a6:82:9f:
                    70:da:b8:25:19:5e:96:d4:69:2d:69:a2:91:4e:a2:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:25:04:3e:ce:2f:85:16:df:20:a7:74:10:46:39:94:
        30:d0:b3:00:07:e6:c6:ce:7b:b3:a6:a2:6d:40:55:08:
        70:c8:9a:8b:54:1e:7b:9f:57:51:6b:ed:72:e4:ed:45:
        6a:4a:75:9d:a3:03:76:a9:99:a1:b5:0e:b8:0d:e2:e8:
        9c:1a:5c:17:18:fb:c9:5e:5c:6d:45:a0:e5:81:e3:45:
        cd:d9:23:9a:0c:b4:ee:98:39:04:09:00:7a:12:c2:7c:
        37:43:46:92:93:d9:23:dc:91:a3:75:7e:6a:7e:9b:56:
        d8:e6:65:8d:a4:06:b3:88:39:c6:95:11:fe:67:0e:4c
    Fingerprint (MD5):
        E3:65:B8:05:E5:B0:57:D0:E1:FE:2E:E5:65:D9:8E:09
    Fingerprint (SHA1):
        3F:C0:9B:AD:B5:2A:78:9E:D2:57:9D:F3:55:01:54:80:AD:B2:96:E6


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6385: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175238 (0x432f5446)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:52:56 2012
            Not After : Tue Nov 28 01:52:56 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:43:7d:87:36:6c:f7:e1:d1:33:c0:3a:5a:99:a6:c1:
                    70:c1:fb:25:02:3f:8e:bc:36:2e:d8:a0:1a:ec:05:34:
                    6b:28:e3:e0:24:1d:92:6c:bc:f8:db:23:ef:09:ac:44:
                    70:39:27:c2:37:e7:47:ec:4a:ce:68:94:6f:1d:33:89:
                    ed:32:e9:9e:6c:9b:03:cb:f0:20:2a:3a:6f:12:3a:eb:
                    2c:20:6c:26:5c:eb:0b:83:dc:21:00:6a:96:b4:c0:66:
                    fb:fd:d4:d2:9c:37:04:c8:36:f3:ea:a9:33:a6:82:9f:
                    70:da:b8:25:19:5e:96:d4:69:2d:69:a2:91:4e:a2:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:25:04:3e:ce:2f:85:16:df:20:a7:74:10:46:39:94:
        30:d0:b3:00:07:e6:c6:ce:7b:b3:a6:a2:6d:40:55:08:
        70:c8:9a:8b:54:1e:7b:9f:57:51:6b:ed:72:e4:ed:45:
        6a:4a:75:9d:a3:03:76:a9:99:a1:b5:0e:b8:0d:e2:e8:
        9c:1a:5c:17:18:fb:c9:5e:5c:6d:45:a0:e5:81:e3:45:
        cd:d9:23:9a:0c:b4:ee:98:39:04:09:00:7a:12:c2:7c:
        37:43:46:92:93:d9:23:dc:91:a3:75:7e:6a:7e:9b:56:
        d8:e6:65:8d:a4:06:b3:88:39:c6:95:11:fe:67:0e:4c
    Fingerprint (MD5):
        E3:65:B8:05:E5:B0:57:D0:E1:FE:2E:E5:65:D9:8E:09
    Fingerprint (SHA1):
        3F:C0:9B:AD:B5:2A:78:9E:D2:57:9D:F3:55:01:54:80:AD:B2:96:E6


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6386: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6387: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175245 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6388: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6389: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6390: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175246 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6391: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6392: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #6393: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CAArmyReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6394: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127175247   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6395: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #6396: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #6397: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CANavyReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6398: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127175248   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6399: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #6400: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6401: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6402: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127175249 -7 Bridge@CAArmy  --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6403: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #6404: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127175250 -7 Bridge@CANavy  --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6405: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #6406: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #6407: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6408: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6409: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127175251   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6410: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6411: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6412: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6413: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127175252   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6414: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #6415: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6416: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6417: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127175253   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6418: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6419: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6420: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6421: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127175254   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6422: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6423: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6424: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175245 (0x432f544d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:02 2012
            Not After : Tue Nov 28 01:53:02 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:5a:38:cb:a5:0a:44:76:26:cb:35:d6:92:d0:2b:4e:
                    b9:40:65:05:40:55:87:d6:ca:06:ef:34:80:2d:72:41:
                    94:8b:70:28:d0:8f:d9:81:7a:cb:fe:3c:74:d3:36:c3:
                    78:db:b0:15:d9:e4:a7:b3:ba:5e:46:f8:00:15:29:34:
                    8f:af:9b:ea:93:90:1a:4b:65:c4:9d:9b:0e:68:73:04:
                    4d:85:ed:92:22:01:fb:e1:4f:04:b8:a7:0a:47:08:64:
                    b6:d5:3d:b5:8f:5b:56:db:a7:11:e5:f0:85:d1:b4:c8:
                    3f:24:4d:7f:9d:f4:b6:74:ff:ca:82:b8:16:53:89:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a0:39:06:6c:2c:03:4a:f5:ff:56:3e:ae:1a:18:2a:e1:
        2a:d2:52:4f:44:0a:d5:91:64:ad:5e:c1:80:8d:ea:34:
        71:98:fe:95:0d:22:56:7c:0d:1f:dd:53:b4:86:5e:fa:
        cf:36:5d:72:c6:a3:27:27:f4:74:14:31:35:f4:41:ca:
        9d:70:1a:5e:4e:00:ff:a6:d5:69:0b:e4:75:0b:85:4c:
        e0:dd:dc:dd:5a:bc:f2:3d:f6:18:85:d2:4f:64:86:f3:
        ee:63:32:68:b8:a5:23:5c:90:31:f3:14:fa:f6:fe:95:
        e0:5c:1e:5d:93:c4:dd:b1:ec:62:22:be:ea:d5:6a:3f
    Fingerprint (MD5):
        82:1E:73:76:9F:EE:38:71:1B:A4:72:1F:78:80:6E:98
    Fingerprint (SHA1):
        87:3C:B8:C5:10:C2:D2:15:DB:C9:97:F3:6C:43:75:B1:5F:C2:8F:54


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #6425: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6426: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6427: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6428: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6429: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6430: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6431: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6432: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6433: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175246 (0x432f544e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:02 2012
            Not After : Tue Nov 28 01:53:02 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:a2:66:c6:60:56:50:8e:21:0d:fe:cd:a9:e4:51:cf:
                    7c:56:94:28:7b:99:e6:a1:db:56:89:6c:2b:12:8f:e5:
                    c6:cb:45:7e:4c:65:49:8e:cd:43:6d:50:aa:35:1c:a6:
                    76:21:90:44:b8:e1:36:b5:20:f3:09:5b:ac:38:5f:16:
                    85:e7:01:3a:98:e7:78:33:e1:d9:52:67:75:9f:2a:08:
                    2f:74:7f:f1:c7:d4:24:56:25:97:66:cc:5d:8d:ee:f6:
                    cc:83:9e:a5:fe:e2:51:dc:e8:de:47:ff:63:5d:f2:43:
                    e2:e1:ba:a5:1a:d7:b2:9e:2e:dd:30:81:ee:1a:d1:5d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:67:25:25:78:9d:21:02:82:46:16:67:11:7e:09:8c:
        b1:45:7e:c1:77:47:0c:43:53:d2:22:3b:c7:cb:4b:40:
        49:1d:1f:5b:de:a4:92:3c:54:e6:83:41:13:e9:ec:8a:
        16:52:ae:7b:b9:0a:a2:dd:90:5e:d0:9f:0f:4c:5e:c3:
        80:9f:9b:26:9d:bc:27:14:af:34:07:c5:16:3a:9d:1c:
        71:4e:ff:90:d5:2f:3f:4d:20:8f:ea:95:99:4e:1b:af:
        86:e3:8b:bf:44:d2:3b:bd:b3:75:57:c3:0f:2d:60:41:
        68:63:7a:0b:32:55:14:4b:b5:da:40:f4:cf:e7:de:e4
    Fingerprint (MD5):
        80:B4:07:7D:0A:55:46:38:3B:45:35:B1:ED:B0:22:4B
    Fingerprint (SHA1):
        31:F4:2E:9F:9C:30:7F:39:E9:F0:F7:85:32:F5:92:2D:2E:04:E5:EC


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #6434: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6435: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6436: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6437: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6438: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6439: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6440: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #6441: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #6442: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #6443: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #6444: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #6445: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #6446: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #6447: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #6448: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #6449: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #6450: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #6451: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6452: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175255 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6453: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6454: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6455: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6456: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127175256   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6457: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6458: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6459: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6460: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127175257   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6461: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6462: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6463: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6464: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127175258   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6465: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #6466: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6467: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6468: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127175259   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6469: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6470: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6471: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6472: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127175260   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6473: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #6474: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #6475: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6476: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127175261   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6477: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #6478: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #6479: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6480: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127175262   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6481: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #6482: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #6483: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6484: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127175263   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6485: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #6486: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6487: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175255 (0x432f5457)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:12 2012
            Not After : Tue Nov 28 01:53:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    2b:ec:c3:c2:f2:a1:76:df:b1:53:0e:a3:2c:dc:e1:fe:
                    29:c6:fb:74:a4:37:02:6a:f6:1f:e3:80:71:3f:e3:3e:
                    4f:58:ec:d5:2d:4b:1f:c3:b1:5c:e2:15:0d:6a:69:3d:
                    46:c2:40:9d:fd:02:5d:1e:7f:0d:85:e7:a1:01:0f:55:
                    ee:4c:00:e5:d8:a0:ae:8c:62:55:c7:0e:aa:cf:3f:58:
                    a6:60:8f:22:83:c8:5b:4d:7e:d3:ce:aa:f3:28:10:f6:
                    01:ec:20:28:ae:2c:1b:ac:58:a7:f4:a2:7a:e4:4d:a0:
                    43:73:0d:14:5c:d7:24:c0:1a:ed:49:0c:1e:c3:78:26
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2e:02:15:00:b5:2e:12:36:0d:10:be:28:54:91:8b:
        91:00:59:be:ed:95:6c:ca:6a:02:15:00:ae:dc:6a:21:
        77:75:d5:4a:0b:6c:6c:e7:90:03:1f:44:52:b5:6c:ab
    Fingerprint (MD5):
        AA:76:07:96:1F:C4:47:7E:E6:68:A2:EB:8C:10:5B:8F
    Fingerprint (SHA1):
        7B:6F:B2:16:3B:DD:F7:EC:20:3D:3F:3C:4C:A5:A4:E8:26:01:44:76


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6488: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175255 (0x432f5457)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:12 2012
            Not After : Tue Nov 28 01:53:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    2b:ec:c3:c2:f2:a1:76:df:b1:53:0e:a3:2c:dc:e1:fe:
                    29:c6:fb:74:a4:37:02:6a:f6:1f:e3:80:71:3f:e3:3e:
                    4f:58:ec:d5:2d:4b:1f:c3:b1:5c:e2:15:0d:6a:69:3d:
                    46:c2:40:9d:fd:02:5d:1e:7f:0d:85:e7:a1:01:0f:55:
                    ee:4c:00:e5:d8:a0:ae:8c:62:55:c7:0e:aa:cf:3f:58:
                    a6:60:8f:22:83:c8:5b:4d:7e:d3:ce:aa:f3:28:10:f6:
                    01:ec:20:28:ae:2c:1b:ac:58:a7:f4:a2:7a:e4:4d:a0:
                    43:73:0d:14:5c:d7:24:c0:1a:ed:49:0c:1e:c3:78:26
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2e:02:15:00:b5:2e:12:36:0d:10:be:28:54:91:8b:
        91:00:59:be:ed:95:6c:ca:6a:02:15:00:ae:dc:6a:21:
        77:75:d5:4a:0b:6c:6c:e7:90:03:1f:44:52:b5:6c:ab
    Fingerprint (MD5):
        AA:76:07:96:1F:C4:47:7E:E6:68:A2:EB:8C:10:5B:8F
    Fingerprint (SHA1):
        7B:6F:B2:16:3B:DD:F7:EC:20:3D:3F:3C:4C:A5:A4:E8:26:01:44:76


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6489: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175255 (0x432f5457)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:12 2012
            Not After : Tue Nov 28 01:53:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    2b:ec:c3:c2:f2:a1:76:df:b1:53:0e:a3:2c:dc:e1:fe:
                    29:c6:fb:74:a4:37:02:6a:f6:1f:e3:80:71:3f:e3:3e:
                    4f:58:ec:d5:2d:4b:1f:c3:b1:5c:e2:15:0d:6a:69:3d:
                    46:c2:40:9d:fd:02:5d:1e:7f:0d:85:e7:a1:01:0f:55:
                    ee:4c:00:e5:d8:a0:ae:8c:62:55:c7:0e:aa:cf:3f:58:
                    a6:60:8f:22:83:c8:5b:4d:7e:d3:ce:aa:f3:28:10:f6:
                    01:ec:20:28:ae:2c:1b:ac:58:a7:f4:a2:7a:e4:4d:a0:
                    43:73:0d:14:5c:d7:24:c0:1a:ed:49:0c:1e:c3:78:26
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2e:02:15:00:b5:2e:12:36:0d:10:be:28:54:91:8b:
        91:00:59:be:ed:95:6c:ca:6a:02:15:00:ae:dc:6a:21:
        77:75:d5:4a:0b:6c:6c:e7:90:03:1f:44:52:b5:6c:ab
    Fingerprint (MD5):
        AA:76:07:96:1F:C4:47:7E:E6:68:A2:EB:8C:10:5B:8F
    Fingerprint (SHA1):
        7B:6F:B2:16:3B:DD:F7:EC:20:3D:3F:3C:4C:A5:A4:E8:26:01:44:76


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6490: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175255 (0x432f5457)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:12 2012
            Not After : Tue Nov 28 01:53:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    2b:ec:c3:c2:f2:a1:76:df:b1:53:0e:a3:2c:dc:e1:fe:
                    29:c6:fb:74:a4:37:02:6a:f6:1f:e3:80:71:3f:e3:3e:
                    4f:58:ec:d5:2d:4b:1f:c3:b1:5c:e2:15:0d:6a:69:3d:
                    46:c2:40:9d:fd:02:5d:1e:7f:0d:85:e7:a1:01:0f:55:
                    ee:4c:00:e5:d8:a0:ae:8c:62:55:c7:0e:aa:cf:3f:58:
                    a6:60:8f:22:83:c8:5b:4d:7e:d3:ce:aa:f3:28:10:f6:
                    01:ec:20:28:ae:2c:1b:ac:58:a7:f4:a2:7a:e4:4d:a0:
                    43:73:0d:14:5c:d7:24:c0:1a:ed:49:0c:1e:c3:78:26
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2e:02:15:00:b5:2e:12:36:0d:10:be:28:54:91:8b:
        91:00:59:be:ed:95:6c:ca:6a:02:15:00:ae:dc:6a:21:
        77:75:d5:4a:0b:6c:6c:e7:90:03:1f:44:52:b5:6c:ab
    Fingerprint (MD5):
        AA:76:07:96:1F:C4:47:7E:E6:68:A2:EB:8C:10:5B:8F
    Fingerprint (SHA1):
        7B:6F:B2:16:3B:DD:F7:EC:20:3D:3F:3C:4C:A5:A4:E8:26:01:44:76


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #6491: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6492: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 10 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6493: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6494: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #6495: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA0Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6496: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6497: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #6498: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6499: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6500: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6501: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #6502: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #6503: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE11Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6504: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6505: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #6506: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #6507: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6508: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6509: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #6510: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6511: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6512: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6513: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #6514: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #6515: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6516: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6517: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #6518: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128015323Z
nextupdate=20131128015323Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 01:53:23 2012
    Next Update: Thu Nov 28 01:53:23 2013
    CRL Extensions:
chains.sh: #6519: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128015323Z
nextupdate=20131128015323Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:53:23 2012
    Next Update: Thu Nov 28 01:53:23 2013
    CRL Extensions:
chains.sh: #6520: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128015323Z
nextupdate=20131128015323Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 01:53:23 2012
    Next Update: Thu Nov 28 01:53:23 2013
    CRL Extensions:
chains.sh: #6521: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128015323Z
nextupdate=20131128015323Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 01:53:23 2012
    Next Update: Thu Nov 28 01:53:23 2013
    CRL Extensions:
chains.sh: #6522: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128015324Z
addcert 14 20121128015324Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 01:53:24 2012
    Next Update: Thu Nov 28 01:53:23 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 01:53:24 2012
    CRL Extensions:
chains.sh: #6523: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128015325Z
addcert 15 20121128015325Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:53:25 2012
    Next Update: Thu Nov 28 01:53:23 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 01:53:25 2012
    CRL Extensions:
chains.sh: #6524: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6525: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6526: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #6527: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #6528: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #6529: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #6530: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #6531: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #6532: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #6533: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:18 2012
            Not After : Tue Nov 28 01:53:18 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:dc:de:e0:7c:bb:ce:e1:41:6c:f2:d4:4a:2a:2a:8d:
                    62:b9:40:05:bc:d9:37:29:1e:21:1d:42:5b:4a:ab:bd:
                    7f:e4:75:b0:2b:6d:d8:26:53:64:62:3c:09:7f:da:4a:
                    31:a7:be:b0:36:9b:33:39:98:e7:41:69:22:7f:6f:8b:
                    c5:fc:03:61:9a:25:71:35:a0:6a:0c:b7:4e:52:0e:2c:
                    90:9a:4f:78:69:81:0b:06:55:0c:03:c6:61:5f:ec:cd:
                    f7:f7:d7:5a:3b:2c:9b:06:5c:90:58:19:98:f7:2e:6e:
                    76:c8:05:4d:f9:ce:4a:47:3d:ef:d9:d3:7a:e2:07:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7e:90:ed:ee:95:30:7b:ca:0e:1e:fc:cc:db:48:80:01:
        42:df:cd:88:8e:25:e5:d0:dc:0f:c1:ef:54:f6:90:76:
        82:d5:14:7b:d9:46:fb:77:b1:34:61:87:2c:1e:33:8c:
        f7:87:dd:fc:a0:c3:93:0e:3d:63:fb:7f:13:90:e9:90:
        5f:b0:d9:30:0d:f7:05:2d:f5:8f:33:c0:e4:3a:19:11:
        91:6d:67:77:72:ca:88:51:04:f9:ee:60:90:d0:d7:cd:
        10:38:57:86:35:6c:f2:27:5f:df:37:3a:7a:dd:f1:e9:
        17:7a:c3:50:2e:62:e5:97:bd:d4:b6:90:1c:0d:52:05
    Fingerprint (MD5):
        D7:E4:E2:6C:6C:0B:F0:86:0C:52:65:8E:E4:E0:C9:14
    Fingerprint (SHA1):
        15:50:4E:03:CA:9C:B1:7D:E9:B2:6C:3C:3D:EA:52:AF:F3:C5:EE:B0

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6534: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6535: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:18 2012
            Not After : Tue Nov 28 01:53:18 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:dc:de:e0:7c:bb:ce:e1:41:6c:f2:d4:4a:2a:2a:8d:
                    62:b9:40:05:bc:d9:37:29:1e:21:1d:42:5b:4a:ab:bd:
                    7f:e4:75:b0:2b:6d:d8:26:53:64:62:3c:09:7f:da:4a:
                    31:a7:be:b0:36:9b:33:39:98:e7:41:69:22:7f:6f:8b:
                    c5:fc:03:61:9a:25:71:35:a0:6a:0c:b7:4e:52:0e:2c:
                    90:9a:4f:78:69:81:0b:06:55:0c:03:c6:61:5f:ec:cd:
                    f7:f7:d7:5a:3b:2c:9b:06:5c:90:58:19:98:f7:2e:6e:
                    76:c8:05:4d:f9:ce:4a:47:3d:ef:d9:d3:7a:e2:07:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7e:90:ed:ee:95:30:7b:ca:0e:1e:fc:cc:db:48:80:01:
        42:df:cd:88:8e:25:e5:d0:dc:0f:c1:ef:54:f6:90:76:
        82:d5:14:7b:d9:46:fb:77:b1:34:61:87:2c:1e:33:8c:
        f7:87:dd:fc:a0:c3:93:0e:3d:63:fb:7f:13:90:e9:90:
        5f:b0:d9:30:0d:f7:05:2d:f5:8f:33:c0:e4:3a:19:11:
        91:6d:67:77:72:ca:88:51:04:f9:ee:60:90:d0:d7:cd:
        10:38:57:86:35:6c:f2:27:5f:df:37:3a:7a:dd:f1:e9:
        17:7a:c3:50:2e:62:e5:97:bd:d4:b6:90:1c:0d:52:05
    Fingerprint (MD5):
        D7:E4:E2:6C:6C:0B:F0:86:0C:52:65:8E:E4:E0:C9:14
    Fingerprint (SHA1):
        15:50:4E:03:CA:9C:B1:7D:E9:B2:6C:3C:3D:EA:52:AF:F3:C5:EE:B0

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6536: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6537: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
tstclnt: TCP Connection failed: I/O operation timed out
chains.sh: #6538: Test that OCSP server is reachable - FAILED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6539: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -m 1127175264 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6540: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6541: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #6542: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA0Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6543: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127175265   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6544: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #6545: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6546: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA1Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127175154.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6547: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127175141.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6548: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #6549: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #6550: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE11Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127175154.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6551: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127175266   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6552: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #6553: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6554: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o CA2Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127175154.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6555: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127175142.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6556: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #6557: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #6558: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6559: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127175267   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6560: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #6561: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6562: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE1Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127175154.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6563: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127175143.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6564: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #6565: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6566: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/tests_noise -o EE2Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127175154.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6567: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/pkix/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127175144.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6568: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #6569: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128015352Z
nextupdate=20131128015352Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 01:53:52 2012
    Next Update: Thu Nov 28 01:53:52 2013
    CRL Extensions:
chains.sh: #6570: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128015352Z
nextupdate=20131128015352Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:53:52 2012
    Next Update: Thu Nov 28 01:53:52 2013
    CRL Extensions:
chains.sh: #6571: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128015352Z
nextupdate=20131128015352Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 01:53:52 2012
    Next Update: Thu Nov 28 01:53:52 2013
    CRL Extensions:
chains.sh: #6572: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128015353Z
nextupdate=20131128015353Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 01:53:53 2012
    Next Update: Thu Nov 28 01:53:53 2013
    CRL Extensions:
chains.sh: #6573: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128015354Z
addcert 20 20121128015354Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:53:54 2012
    Next Update: Thu Nov 28 01:53:52 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 01:53:54 2012
    CRL Extensions:
chains.sh: #6574: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128015355Z
addcert 40 20121128015355Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 01:53:55 2012
    Next Update: Thu Nov 28 01:53:52 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 01:53:54 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 01:53:55 2012
    CRL Extensions:
chains.sh: #6575: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6576: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6577: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #6578: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175264 (0x432f5460)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:47 2012
            Not After : Tue Nov 28 01:53:47 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:55:fc:8e:ff:48:5e:a8:98:47:27:6a:f8:37:2f:b5:
                    d4:cf:c0:2f:14:6b:29:fc:29:1e:68:73:40:0a:9e:0d:
                    eb:8d:78:e5:b9:3b:9b:66:8b:63:4a:9a:28:bb:da:83:
                    e6:4d:e5:7c:43:da:19:d5:ea:0f:e2:a9:d7:13:5a:d1:
                    76:4b:03:ce:fa:af:bf:cf:95:87:70:92:2d:a5:4e:11:
                    e1:0e:d3:fb:7f:6b:c7:b7:3a:d5:65:bc:92:62:5f:11:
                    67:12:dc:0b:a2:45:2e:e6:30:f9:20:0a:99:71:b7:00:
                    0f:a5:99:53:ee:ea:68:02:af:b1:d2:39:a4:30:ae:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        13:07:1e:84:56:9f:be:12:c6:5e:79:aa:a8:87:61:e0:
        08:40:14:c2:3d:1f:1d:65:90:84:30:7b:fe:73:22:94:
        c9:62:6c:ed:d1:92:28:63:fa:8e:a5:0d:10:32:67:05:
        95:b5:35:7c:92:47:2c:6b:df:dd:0a:21:cf:f8:a7:01:
        93:7c:4e:fb:a7:10:05:0d:f1:b9:b7:69:ae:8c:f9:ea:
        80:0d:43:b4:8f:70:b7:bd:00:f5:bf:cc:15:6a:b2:9d:
        ca:c7:74:b7:d5:06:b5:30:43:34:f3:24:ed:68:1f:e6:
        af:8d:48:a7:7f:2d:a7:fd:26:4a:1b:08:41:65:66:d3
    Fingerprint (MD5):
        0B:36:96:A3:CF:33:A5:59:55:88:43:E0:04:0B:90:CA
    Fingerprint (SHA1):
        FA:92:75:6D:E2:49:15:2A:48:DF:22:09:33:CC:7A:33:5A:2C:DA:74

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6579: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6580: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127175264 (0x432f5460)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 01:53:47 2012
            Not After : Tue Nov 28 01:53:47 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:55:fc:8e:ff:48:5e:a8:98:47:27:6a:f8:37:2f:b5:
                    d4:cf:c0:2f:14:6b:29:fc:29:1e:68:73:40:0a:9e:0d:
                    eb:8d:78:e5:b9:3b:9b:66:8b:63:4a:9a:28:bb:da:83:
                    e6:4d:e5:7c:43:da:19:d5:ea:0f:e2:a9:d7:13:5a:d1:
                    76:4b:03:ce:fa:af:bf:cf:95:87:70:92:2d:a5:4e:11:
                    e1:0e:d3:fb:7f:6b:c7:b7:3a:d5:65:bc:92:62:5f:11:
                    67:12:dc:0b:a2:45:2e:e6:30:f9:20:0a:99:71:b7:00:
                    0f:a5:99:53:ee:ea:68:02:af:b1:d2:39:a4:30:ae:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        13:07:1e:84:56:9f:be:12:c6:5e:79:aa:a8:87:61:e0:
        08:40:14:c2:3d:1f:1d:65:90:84:30:7b:fe:73:22:94:
        c9:62:6c:ed:d1:92:28:63:fa:8e:a5:0d:10:32:67:05:
        95:b5:35:7c:92:47:2c:6b:df:dd:0a:21:cf:f8:a7:01:
        93:7c:4e:fb:a7:10:05:0d:f1:b9:b7:69:ae:8c:f9:ea:
        80:0d:43:b4:8f:70:b7:bd:00:f5:bf:cc:15:6a:b2:9d:
        ca:c7:74:b7:d5:06:b5:30:43:34:f3:24:ed:68:1f:e6:
        af:8d:48:a7:7f:2d:a7:fd:26:4a:1b:08:41:65:66:d3
    Fingerprint (MD5):
        0B:36:96:A3:CF:33:A5:59:55:88:43:E0:04:0B:90:CA
    Fingerprint (SHA1):
        FA:92:75:6D:E2:49:15:2A:48:DF:22:09:33:CC:7A:33:5A:2C:DA:74

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6581: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6582: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 36393 at Tue Nov 27 17:53:56 PST 2012
kill -USR1 36393
selfserv: normal termination
httpserv with PID 36393 killed at Tue Nov 27 17:53:56 PST 2012
TIMESTAMP chains END: Tue Nov 27 17:53:56 PST 2012
chains.sh: Testing with upgraded library ===============================
cp: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/cert.done: No such file or directory
Running tests for dbupgrade
TIMESTAMP dbupgrade BEGIN: Tue Nov 27 17:53:57 PST 2012
dbupgrade.sh: DB upgrade tests ===============================
Reset databases to their initial values:
certutil: could not find certificate named "objsigner": security library: bad database.

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
dbupgrade.sh: Legacy to shared Library update ===============================
alicedir
upgrading db alicedir


Generating key.  This may take a few moments...

dbupgrade.sh: #6583: Upgrading alicedir  - PASSED
bobdir
upgrading db bobdir


Generating key.  This may take a few moments...

dbupgrade.sh: #6584: Upgrading bobdir  - PASSED
CA
upgrading db CA


Generating key.  This may take a few moments...

dbupgrade.sh: #6585: Upgrading CA  - PASSED
cert_extensions
upgrading db cert_extensions


Generating key.  This may take a few moments...

dbupgrade.sh: #6586: Upgrading cert_extensions  - PASSED
client
upgrading db client


Generating key.  This may take a few moments...

dbupgrade.sh: #6587: Upgrading client  - PASSED
clientCA
upgrading db clientCA


Generating key.  This may take a few moments...

dbupgrade.sh: #6588: Upgrading clientCA  - PASSED
dave
upgrading db dave


Generating key.  This may take a few moments...

dbupgrade.sh: #6589: Upgrading dave  - PASSED
eccurves
upgrading db eccurves


Generating key.  This may take a few moments...

dbupgrade.sh: #6590: Upgrading eccurves  - PASSED
eve
upgrading db eve


Generating key.  This may take a few moments...

dbupgrade.sh: #6591: Upgrading eve  - PASSED
ext_client
upgrading db ext_client


Generating key.  This may take a few moments...

dbupgrade.sh: #6592: Upgrading ext_client  - PASSED
ext_server
upgrading db ext_server


Generating key.  This may take a few moments...

dbupgrade.sh: #6593: Upgrading ext_server  - PASSED
SDR
upgrading db SDR


Generating key.  This may take a few moments...

dbupgrade.sh: #6594: Upgrading SDR  - PASSED
server
upgrading db server


Generating key.  This may take a few moments...

dbupgrade.sh: #6595: Upgrading server  - PASSED
serverCA
upgrading db serverCA


Generating key.  This may take a few moments...

dbupgrade.sh: #6596: Upgrading serverCA  - PASSED
tools/copydir
skipping db tools/copydir
dbupgrade.sh: #6597: No directory tools/copydir  - PASSED
upgrading db fips


Generating key.  This may take a few moments...

dbupgrade.sh: #6598: Upgrading fips  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
TIMESTAMP dbupgrade END: Tue Nov 27 17:54:04 PST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 17:54:04 PST 2012
lowhash.sh: Lowhash Tests ===============================
freebl lowhash not supported in this plaform.
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 17:54:04 PST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 17:54:04 PST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6599: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                7f:65:c5:a4:52:72:70:4a:23:af:69:83:db:49:c0:e7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6600: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6601: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6602: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6603: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                fe:a3:6b:ce:fa:ae:6b:13:5a:16:63:0f:a9:78:1d:97
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 01:29:41 2012
            Not After : Tue Nov 28 01:29:41 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:01:02:87:87:6f:9b:e8:24:c6:54:84:c0:11:02:81:
                    32:58:17:c4:27:ff:e2:4c:6a:55:30:a0:9f:d5:db:90:
                    f3:f1:1f:60:22:ba:d4:4a:ba:f3:25:2f:07:05:41:0e:
                    f4:56:34:0b:03:8b:a0:28:a0:37:3b:bb:57:55:c7:37:
                    69:78:e6:00:6b:5c:31:07:43:93:a0:00:fe:4f:c1:66:
                    38:67:41:00:46:7b:0e:40:e8:ce:0a:2e:0f:c0:df:46:
                    d1:4e:2d:f1:c6:3d:eb:8c:d1:fa:8c:7b:e2:7f:34:55:
                    db:c2:42:01:02:f4:bc:fc:a5:c8:9d:0e:9f:78:a5:bf:
                    3b:04:dd:52:d6
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:41:10:57:48:96:c6:3b:d2:dc:b5:05:97:
        07:46:14:95:74:1b:ea:6d:47:1e:ed:c1:86:66:70:eb:
        af:f3:ae:e4:89:df:e2:c1:4d:40:f6:25:42:6d:e9:0e:
        7d:19:b2:41:9a:bf:39:3c:24:aa:7e:89:aa:f1:2e:be:
        41:b5:b2:5f:03:ed:02:42:01:5e:21:47:87:14:f7:b9:
        61:cb:f1:37:4a:6e:b8:ca:18:aa:dc:2d:1c:b4:26:c1:
        f1:45:40:6d:e4:55:48:36:cc:9e:f1:9e:f5:91:b5:aa:
        a1:4c:5e:42:cc:74:54:8d:29:8b:11:48:8d:b1:83:cd:
        53:3c:5c:b9:58:ea:b0:8a:ec:49
    Fingerprint (MD5):
        2E:B9:06:AC:5E:54:D7:31:36:AD:31:46:74:4D:D9:D4
    Fingerprint (SHA1):
        AB:12:11:DC:82:7C:CA:FA:26:7F:D8:6E:32:77:C0:24:C2:69:7F:CC

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:62:64:18:e1:3b:a3:e6:72:66:10:4c:7a:34:77:61:
                    34:bd:28:2e:e1:16:f8:9b:be:c4:0c:16:eb:eb:1f:98:
                    8b:c5:fc:e0:c0:fa:94:c1:9d:1c:f1:4c:0b:03:8d:38:
                    2c:e4:80:6c:dd:1a:0b:e9:88:c2:67:e7:03:29:36:37:
                    f8:4a:6c:0c:b5:1c:98:dc:45:40:f3:ac:8c:79:f5:b8:
                    fa:e4:02:91:7f:b1:7e:d5:dd:87:17:96:f4:f7:cb:8f:
                    3d
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:00:ca:e7:7c:6f:9b:e9:83:90:80:12:
        c0:0c:11:3b:54:a4:fe:d9:86:97:09:ff:a8:70:2f:29:
        00:8a:f4:b9:06:fb:34:ca:a7:7b:bf:e6:01:c7:ea:69:
        dd:39:ce:c3:4b:ca:d2:a5:76:7d:39:d4:8d:8c:74:79:
        49:64:27:6a:0c:a0:67:02:41:71:5e:b0:c7:50:9f:72:
        7f:bc:07:7c:23:7f:c8:a1:e6:5a:c0:ff:95:bf:08:e0:
        d1:59:bd:7c:4f:a9:c0:01:2f:c4:09:fa:ae:8f:93:8f:
        c3:42:b3:a5:37:d1:ff:77:27:5b:c5:38:6a:ea:1e:dc:
        c7:91:0c:35:ac:a1:d1:62:39:55
    Fingerprint (MD5):
        C9:88:BA:7A:A1:D3:1A:24:B9:46:86:00:2D:AA:32:89
    Fingerprint (SHA1):
        74:DE:46:B1:6D:24:01:F5:1C:BE:4E:F8:F4:C7:3B:D8:14:FF:D3:6C

    Friendly Name: Alice-ec

tools.sh: #6604: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6605: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                6f:10:37:5e:f3:93:bf:43:55:c2:75:30:9b:d8:56:24
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6606: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6607: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6608: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                e3:ad:3f:f3:7d:47:c9:ff:0e:42:d4:11:54:9b:dc:4c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6609: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6610: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6611: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                7f:4e:78:4f:84:b9:d4:ac:69:c5:36:a2:5f:03:bf:31
            Iteration Count: 2000 (0x7d0)
tools.sh: #6612: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6613: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6614: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                92:36:36:9d:28:9f:40:74:60:f5:ce:e3:a7:9c:c2:92
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6615: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6616: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6617: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                7a:85:f6:b7:3c:c2:ee:36:52:ae:ac:f6:eb:05:f7:64
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6618: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6619: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6620: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c3:83:80:7c:41:bc:b9:4d:d4:56:04:38:91:66:96:62
            Iteration Count: 2000 (0x7d0)
tools.sh: #6621: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6622: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6623: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        9c:8b:38:52:07:7e:a5:95:1c:92:de:7b:76:f6:3b:a3
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:f0:d4:d1:ae:4f:3e:15:42:35:6d:db:53:de:68:
                    43:a8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6624: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6625: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6626: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2f:6d:90:7a:25:b8:6a:10:66:2a:a0:af:ea:10:6e:2f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:ba:f8:48:04:8a:fa:82:e6:5a:ee:9a:0e:a9:69:
                    53:fe
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6627: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6628: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6629: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        1c:7d:1e:67:41:22:ac:ce:ab:99:47:5b:0e:ef:d5:94
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:8e:8a:1f:52:37:fe:1b:3f:cf:7e:14:a9:d2:65:
                    8d:7a
tools.sh: #6630: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6631: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6632: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        93:79:7f:32:c1:d7:74:c8:2e:8f:2f:31:1f:20:15:dc
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:b5:13:b6:15:b6:af:72:71:27:b4:f9:85:38:68:
                    d2:e1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6633: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6634: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6635: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        55:6c:be:8d:64:4d:6f:98:40:92:ff:1a:62:1c:85:c1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:dd:39:26:ba:c4:36:e3:c5:89:3e:ca:c8:02:61:
                    04:8d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6636: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6637: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6638: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        4f:36:ad:e6:b1:24:d5:42:2c:03:47:cf:a9:b8:ae:b5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:7c:09:c1:58:0d:35:f8:c1:07:8e:eb:26:82:83:
                    c7:2b
tools.sh: #6639: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6640: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6641: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5b:10:b3:6c:4d:d5:b9:65:7d:33:8a:16:b4:a3:2f:35
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:1e:b6:e6:51:16:fd:65:db:0d:fd:a8:53:91:69:
                    fe:8e
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6642: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6643: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6644: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        95:6d:c0:f0:69:49:52:17:31:43:87:e0:da:07:d8:8b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:fa:c9:06:59:43:ba:10:61:4a:71:34:0e:57:50:
                    e7:3e
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6645: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6646: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6647: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        c6:d6:21:10:01:9e:f1:90:68:3f:ed:cd:61:b8:67:68
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:98:b7:a9:00:e7:e3:33:e4:d1:18:b3:5d:1f:4c:
                    04:b2
tools.sh: #6648: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6649: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6650: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d4:82:14:d6:1d:1b:27:fb:b3:ef:3a:6c:c6:b6:a7:a0
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:6b:a2:69:fd:a5:00:ba:0c:08:d6:3b:25:d3:17:
                    c7:38
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6651: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6652: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6653: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3d:85:4f:4c:01:19:1b:15:d0:04:b3:53:51:b0:13:83
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:f4:55:e2:5f:d9:2c:3a:56:54:e3:29:39:28:fc:
                    41:ae
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6655: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6656: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        25:16:7f:72:a8:60:af:e1:8e:53:ae:e0:da:5e:98:3c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:3c:6f:0c:4a:40:86:d4:d5:29:bd:63:fa:3f:47:
                    14:af
tools.sh: #6657: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6658: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6659: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        29:5c:6e:8e:af:25:1a:ca:0b:22:9d:54:f0:22:90:e5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:aa:ad:82:3c:e1:b7:0a:7f:47:1c:b4:da:da:63:
                    3d:d9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6662: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2f:b6:b3:06:9e:eb:4a:2b:d9:3d:7f:e2:96:40:84:54
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:2d:88:f3:40:da:4d:ea:2c:c1:d2:c4:91:05:49:
                    54:38
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6665: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        fd:59:ea:05:18:43:3c:eb:1d:63:ae:14:2a:ba:a5:ee
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:32:7a:d8:29:7b:89:8b:da:a0:c3:3f:4c:69:a1:
                    2f:df
tools.sh: #6666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6668: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        c4:9a:d8:f0:21:0c:3d:2b:dd:22:f3:d1:14:f5:b9:b0
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:30:44:bd:e2:7e:d9:a1:96:35:ed:8d:b7:bf:52:
                    14:5a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6671: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        db:b9:48:c6:6f:41:17:6c:f9:98:08:28:d5:1b:a6:3b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:b7:9e:ad:96:e8:ed:39:d0:6d:24:49:b6:ff:91:
                    4c:2f
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6674: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        22:df:d7:cd:eb:ae:5c:db:04:71:25:ac:44:d4:00:55
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:18:cd:74:55:e5:c3:13:01:6f:6a:c9:8c:fd:4c:
                    59:4e
tools.sh: #6675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6677: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                ad:7a:5c:d7:23:7b:23:df:13:25:bc:e2:58:b7:4c:92
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6680: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                5c:77:af:0d:93:f8:34:d4:18:d6:04:db:6e:16:34:0a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6683: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                89:ac:89:4e:85:18:9a:98:c9:37:8a:13:f5:95:6a:fb
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6685: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6686: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                ec:7f:ab:28:5e:52:3a:66:c9:5e:73:07:b6:f0:8e:15
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6689: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                a3:8d:cd:64:a7:ff:a5:31:5d:cf:01:20:18:5f:3f:1f
            Iteration Count: 2000 (0x7d0)
tools.sh: #6690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6692: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                1f:2e:99:86:cc:32:e4:1f:5e:6b:f5:fb:69:bf:91:fe
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6695: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                08:16:73:22:1b:09:20:3d:1e:e9:37:fe:fb:6b:72:4f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6698: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                4a:15:71:79:d8:be:c5:5b:d3:60:a4:18:aa:84:cf:d0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6700: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6701: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                d7:69:7c:df:7a:ef:aa:76:26:7f:d6:88:16:b5:c3:de
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6704: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                1f:71:e2:be:9d:04:fc:ed:ef:28:a0:34:ba:6b:0d:37
            Iteration Count: 2000 (0x7d0)
tools.sh: #6705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6707: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                69:42:87:cf:57:e3:f4:56:67:d9:1c:dd:02:5d:a8:32
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6710: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                5f:05:03:17:9c:d1:bf:b6:1c:61:24:b6:7e:14:5a:06
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6713: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                d9:fe:16:36:ed:ab:ac:db:c5:b7:b6:17:0c:aa:3a:60
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6715: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6716: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                58:19:5f:0f:e0:c2:ed:57:dd:8c:ac:e8:ab:23:d6:9f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6719: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ea:61:83:44:bd:8c:4a:13:7f:f7:ee:8c:27:2b:08:2f
            Iteration Count: 2000 (0x7d0)
tools.sh: #6720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6721: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6722: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c8:ad:66:94:c6:4a:c8:12:72:b8:78:51:41:4c:41:17
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6724: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6725: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3c:aa:79:0e:7b:67:63:14:a6:07:e2:48:02:6e:2f:96
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6727: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6728: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                02:91:c1:9c:6c:80:f0:40:b8:72:53:a7:2b:22:c0:3f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6730: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6731: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                27:55:12:6c:21:1b:03:36:5c:96:bf:e3:5a:81:41:c9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6733: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6734: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                4c:b5:10:06:44:56:61:c6:1a:a1:29:d4:b2:98:ae:b1
            Iteration Count: 2000 (0x7d0)
tools.sh: #6735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6736: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6737: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b2:c6:e1:e7:14:b2:42:94:dc:a4:64:67:be:11:ce:52
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6739: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6740: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b9:be:64:46:ef:df:82:cb:11:0e:f4:de:c1:f7:0d:a4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6742: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6743: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                67:21:57:a4:e0:6f:70:73:a1:f1:e2:13:6c:d2:77:0d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6745: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6746: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                db:0a:f9:27:0a:74:7e:b2:69:21:65:a1:61:46:bf:a3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6748: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6749: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                31:9d:0b:b8:6c:e2:0a:8b:71:42:86:e0:f6:d9:5e:7d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6751: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6752: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                46:1e:9b:92:94:40:44:31:55:a1:1c:a4:a0:97:5b:d7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6754: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6755: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a2:c9:be:47:68:58:86:9e:a5:dc:fc:97:6a:0c:82:2a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6757: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6758: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                7c:00:f0:74:9e:27:80:12:1d:12:09:bc:5d:dc:d0:2d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6760: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6761: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c6:32:80:78:72:1f:7a:4d:f9:3b:2a:ee:b8:ef:75:1c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6763: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6764: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ef:9f:51:3e:70:a5:f4:2d:eb:99:29:60:3d:da:55:17
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:38 2012
            Not After : Tue Nov 28 01:29:38 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:46:12:75:6f:74:6b:d2:c3:b2:fc:d3:9e:2e:95:2e:
                    56:40:22:07:7d:54:12:fe:a9:65:29:87:78:b1:60:7b:
                    8c:67:f6:71:12:46:6d:80:27:47:66:7e:86:01:12:ef:
                    9a:54:22:2c:e9:ac:a3:63:90:2c:b4:d1:af:40:54:4e:
                    25:c7:d9:66:60:5f:77:18:51:47:20:bc:e0:39:91:9e:
                    93:41:89:0d:05:b3:98:34:5a:ae:14:10:0d:03:62:b7:
                    37:f7:d8:dd:df:67:3f:22:d6:4f:fc:90:46:6b:40:90:
                    d8:9c:c1:77:49:cb:11:61:4d:8d:75:8f:d0:ff:40:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:02:c0:57:e9:81:e8:22:09:11:df:7e:59:35:31:af:
        28:31:5f:7f:c7:e3:0b:e9:e1:f6:7a:f8:1a:b9:8c:12:
        d9:d9:86:7b:34:91:57:6b:9f:ab:71:49:96:9d:82:fa:
        3c:ab:b9:05:2d:fe:5f:b6:c7:f1:0b:4d:0e:aa:07:75:
        3f:9b:bf:d0:23:83:9e:d6:f2:6b:a5:b8:7d:d3:00:ff:
        44:53:94:22:ee:ea:71:ec:e5:d7:d6:a7:58:9d:d3:a6:
        64:09:31:46:e7:a1:d1:35:fb:54:b7:99:c2:d7:09:a2:
        f0:ed:c6:b6:cb:a3:46:6a:61:de:3e:ec:14:c0:05:91
    Fingerprint (MD5):
        09:E0:FF:32:64:F6:67:36:2C:C3:08:AB:0A:3E:0F:E3
    Fingerprint (SHA1):
        B0:1F:81:7C:0B:3C:FB:99:5F:E1:67:FF:AF:48:5A:47:5C:44:C4:BB

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:29:53 2012
            Not After : Tue Nov 28 01:29:53 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:88:22:17:30:02:56:ec:c7:86:05:ac:49:8c:7d:d3:
                    30:c0:c0:c4:b5:75:2f:60:c1:b0:1c:26:97:2b:27:83:
                    32:95:c7:a2:4e:1d:06:52:dc:39:ac:27:b6:0e:64:0a:
                    25:a0:f0:ee:ee:2c:d1:8b:7a:82:5a:66:ef:1e:5a:96:
                    d5:ed:53:33:fd:6d:73:8c:ec:f7:d2:f9:f5:7a:7f:e0:
                    81:3d:d3:e4:30:38:1a:3b:39:e0:ec:24:a9:29:f6:16:
                    84:c1:44:ec:bc:06:6f:3c:a9:00:65:89:2c:5c:4f:f7:
                    e8:9c:1d:0b:66:81:59:48:fa:eb:7d:b9:15:fe:77:4f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:d8:36:73:52:d6:b7:ed:a7:f9:57:58:e2:4d:34:fd:
        03:93:81:30:31:de:c8:01:cd:5a:f4:15:4a:b7:1c:c4:
        48:40:40:4e:a5:da:db:f0:f8:62:e4:ff:2a:a4:c1:9e:
        f2:6d:71:4a:fe:a0:e2:e3:2f:bc:18:30:35:0f:38:5a:
        9a:94:e5:4c:66:8a:64:b7:bc:b4:cb:01:2a:06:77:08:
        f6:35:da:85:db:e4:31:a4:92:20:8c:31:3a:aa:74:29:
        62:c5:7f:ac:9b:e3:de:51:5b:c6:1f:ed:41:2a:c3:a4:
        fa:0d:a5:2d:5e:20:a3:d7:b1:6a:48:54:2a:a8:38:c9
    Fingerprint (MD5):
        8A:B8:1B:D7:BE:BD:A2:58:1B:67:31:77:CB:81:C9:83
    Fingerprint (SHA1):
        CE:10:68:0E:99:85:11:E4:07:31:17:61:22:27:0E:DD:F7:0D:DD:30

    Friendly Name: Alice

tools.sh: #6765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6766: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #6767: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6768: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #6769: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #6770: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #6771: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #6772: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #6773: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #6774: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #6775: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 17:54:36 PST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 17:54:36 PST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #6776: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #6777: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      a2070ac4f1d6ed14f3388a65f5fdebd64989187e   FIPS_PUB_140_Test_Certificate
fips.sh: #6778: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #6779: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #6780: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #6781: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #6782: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #6783: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #6784: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #6785: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #6786: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #6787: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #6788: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      a2070ac4f1d6ed14f3388a65f5fdebd64989187e   FIPS_PUB_140_Test_Certificate
fips.sh: #6789: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #6790: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #6791: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #6792: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #6793: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      a2070ac4f1d6ed14f3388a65f5fdebd64989187e   FIPS_PUB_140_Test_Certificate
fips.sh: #6794: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #6795: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #6796: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
mkdir: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle: File exists
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcrmf.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libjar.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckfw.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle/libsoftokn3.dylib
mangle -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle/libsoftokn3.dylib -o -8 -b 5
Changing byte 0x00048078 (295032): from 65 (101) to 45 (69)
DYLD_LIBRARY_PATH=/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/fips/mangle dbtest -r -d ../fips
fips.sh: #6797: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 17:55:09 PST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 17:55:09 PST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #6798: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #6799: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 17:55:10 PST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 17:55:10 PST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #6800: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6801: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #6802: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #6803: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #6804: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #6805: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6806: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #6807: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #6808: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #6809: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #6810: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6811: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #6812: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #6813: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #6814: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #6815: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6816: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #6817: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #6818: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #6819: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #6820: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6821: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #6822: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #6823: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #6824: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #6825: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6826: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #6827: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #6828: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #6829: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #6830: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6831: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #6832: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #6833: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #6834: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #6835: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #6836: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #6837: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #6838: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #6839: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #6840: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #6841: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #6842: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #6843: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #6844: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #6845: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #6846: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #6847: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #6848: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #6849: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #6850: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #6851: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #6852: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #6853: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #6854: Decode Encrypted-Data . - PASSED
smime.sh: #6855: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #6856: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #6857: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #6858: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #6859: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #6860: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 17:55:21 PST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 17:55:21 PST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52828 >/dev/null 2>/dev/null
selfserv with PID 52828 found at Tue Nov 27 17:55:21 PST 2012
selfserv with PID 52828 started at Tue Nov 27 17:55:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6861: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 52828 at Tue Nov 27 17:55:21 PST 2012
kill -USR1 52828
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52828 killed at Tue Nov 27 17:55:21 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52875 >/dev/null 2>/dev/null
selfserv with PID 52875 found at Tue Nov 27 17:55:22 PST 2012
selfserv with PID 52875 started at Tue Nov 27 17:55:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6862: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 52875 at Tue Nov 27 17:55:22 PST 2012
kill -USR1 52875
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52875 killed at Tue Nov 27 17:55:22 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52922 >/dev/null 2>/dev/null
selfserv with PID 52922 found at Tue Nov 27 17:55:22 PST 2012
selfserv with PID 52922 started at Tue Nov 27 17:55:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6863: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 52922 at Tue Nov 27 17:55:22 PST 2012
kill -USR1 52922
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52922 killed at Tue Nov 27 17:55:22 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 52981 >/dev/null 2>/dev/null
selfserv with PID 52981 found at Tue Nov 27 17:55:22 PST 2012
selfserv with PID 52981 started at Tue Nov 27 17:55:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6864: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 52981 at Tue Nov 27 17:55:23 PST 2012
kill -USR1 52981
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 52981 killed at Tue Nov 27 17:55:23 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53028 >/dev/null 2>/dev/null
selfserv with PID 53028 found at Tue Nov 27 17:55:23 PST 2012
selfserv with PID 53028 started at Tue Nov 27 17:55:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6865: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53028 at Tue Nov 27 17:55:23 PST 2012
kill -USR1 53028
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53028 killed at Tue Nov 27 17:55:23 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53075 >/dev/null 2>/dev/null
selfserv with PID 53075 found at Tue Nov 27 17:55:23 PST 2012
selfserv with PID 53075 started at Tue Nov 27 17:55:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6866: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53075 at Tue Nov 27 17:55:24 PST 2012
kill -USR1 53075
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53075 killed at Tue Nov 27 17:55:24 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53134 >/dev/null 2>/dev/null
selfserv with PID 53134 found at Tue Nov 27 17:55:24 PST 2012
selfserv with PID 53134 started at Tue Nov 27 17:55:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6867: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53134 at Tue Nov 27 17:55:24 PST 2012
kill -USR1 53134
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53134 killed at Tue Nov 27 17:55:24 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53181 >/dev/null 2>/dev/null
selfserv with PID 53181 found at Tue Nov 27 17:55:24 PST 2012
selfserv with PID 53181 started at Tue Nov 27 17:55:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6868: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53181 at Tue Nov 27 17:55:25 PST 2012
kill -USR1 53181
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53181 killed at Tue Nov 27 17:55:25 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53228 >/dev/null 2>/dev/null
selfserv with PID 53228 found at Tue Nov 27 17:55:25 PST 2012
selfserv with PID 53228 started at Tue Nov 27 17:55:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6869: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53228 at Tue Nov 27 17:55:25 PST 2012
kill -USR1 53228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53228 killed at Tue Nov 27 17:55:25 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53287 >/dev/null 2>/dev/null
selfserv with PID 53287 found at Tue Nov 27 17:55:25 PST 2012
selfserv with PID 53287 started at Tue Nov 27 17:55:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6870: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53287 at Tue Nov 27 17:55:25 PST 2012
kill -USR1 53287
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53287 killed at Tue Nov 27 17:55:26 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53334 >/dev/null 2>/dev/null
selfserv with PID 53334 found at Tue Nov 27 17:55:26 PST 2012
selfserv with PID 53334 started at Tue Nov 27 17:55:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6871: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53334 at Tue Nov 27 17:55:26 PST 2012
kill -USR1 53334
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53334 killed at Tue Nov 27 17:55:26 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53381 >/dev/null 2>/dev/null
selfserv with PID 53381 found at Tue Nov 27 17:55:26 PST 2012
selfserv with PID 53381 started at Tue Nov 27 17:55:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6872: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53381 at Tue Nov 27 17:55:26 PST 2012
kill -USR1 53381
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53381 killed at Tue Nov 27 17:55:26 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53440 >/dev/null 2>/dev/null
selfserv with PID 53440 found at Tue Nov 27 17:55:26 PST 2012
selfserv with PID 53440 started at Tue Nov 27 17:55:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6873: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53440 at Tue Nov 27 17:55:27 PST 2012
kill -USR1 53440
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53440 killed at Tue Nov 27 17:55:27 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53487 >/dev/null 2>/dev/null
selfserv with PID 53487 found at Tue Nov 27 17:55:27 PST 2012
selfserv with PID 53487 started at Tue Nov 27 17:55:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6874: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53487 at Tue Nov 27 17:55:27 PST 2012
kill -USR1 53487
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53487 killed at Tue Nov 27 17:55:27 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53534 >/dev/null 2>/dev/null
selfserv with PID 53534 found at Tue Nov 27 17:55:27 PST 2012
selfserv with PID 53534 started at Tue Nov 27 17:55:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6875: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53534 at Tue Nov 27 17:55:28 PST 2012
kill -USR1 53534
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53534 killed at Tue Nov 27 17:55:28 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53593 >/dev/null 2>/dev/null
selfserv with PID 53593 found at Tue Nov 27 17:55:28 PST 2012
selfserv with PID 53593 started at Tue Nov 27 17:55:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6876: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53593 at Tue Nov 27 17:55:28 PST 2012
kill -USR1 53593
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53593 killed at Tue Nov 27 17:55:28 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53640 >/dev/null 2>/dev/null
selfserv with PID 53640 found at Tue Nov 27 17:55:28 PST 2012
selfserv with PID 53640 started at Tue Nov 27 17:55:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6877: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53640 at Tue Nov 27 17:55:29 PST 2012
kill -USR1 53640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53640 killed at Tue Nov 27 17:55:29 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53687 >/dev/null 2>/dev/null
selfserv with PID 53687 found at Tue Nov 27 17:55:29 PST 2012
selfserv with PID 53687 started at Tue Nov 27 17:55:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6878: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 53687 at Tue Nov 27 17:55:29 PST 2012
kill -USR1 53687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53687 killed at Tue Nov 27 17:55:29 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53746 >/dev/null 2>/dev/null
selfserv with PID 53746 found at Tue Nov 27 17:55:29 PST 2012
selfserv with PID 53746 started at Tue Nov 27 17:55:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6879: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53746 at Tue Nov 27 17:55:30 PST 2012
kill -USR1 53746
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53746 killed at Tue Nov 27 17:55:30 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53793 >/dev/null 2>/dev/null
selfserv with PID 53793 found at Tue Nov 27 17:55:30 PST 2012
selfserv with PID 53793 started at Tue Nov 27 17:55:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6880: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53793 at Tue Nov 27 17:55:30 PST 2012
kill -USR1 53793
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53793 killed at Tue Nov 27 17:55:30 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53840 >/dev/null 2>/dev/null
selfserv with PID 53840 found at Tue Nov 27 17:55:30 PST 2012
selfserv with PID 53840 started at Tue Nov 27 17:55:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6881: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53840 at Tue Nov 27 17:55:30 PST 2012
kill -USR1 53840
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53840 killed at Tue Nov 27 17:55:30 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53899 >/dev/null 2>/dev/null
selfserv with PID 53899 found at Tue Nov 27 17:55:31 PST 2012
selfserv with PID 53899 started at Tue Nov 27 17:55:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6882: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53899 at Tue Nov 27 17:55:31 PST 2012
kill -USR1 53899
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53899 killed at Tue Nov 27 17:55:31 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53946 >/dev/null 2>/dev/null
selfserv with PID 53946 found at Tue Nov 27 17:55:31 PST 2012
selfserv with PID 53946 started at Tue Nov 27 17:55:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6883: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53946 at Tue Nov 27 17:55:31 PST 2012
kill -USR1 53946
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53946 killed at Tue Nov 27 17:55:31 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 53993 >/dev/null 2>/dev/null
selfserv with PID 53993 found at Tue Nov 27 17:55:31 PST 2012
selfserv with PID 53993 started at Tue Nov 27 17:55:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6884: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 53993 at Tue Nov 27 17:55:32 PST 2012
kill -USR1 53993
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 53993 killed at Tue Nov 27 17:55:32 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54052 >/dev/null 2>/dev/null
selfserv with PID 54052 found at Tue Nov 27 17:55:32 PST 2012
selfserv with PID 54052 started at Tue Nov 27 17:55:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6885: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54052 at Tue Nov 27 17:55:32 PST 2012
kill -USR1 54052
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54052 killed at Tue Nov 27 17:55:32 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54099 >/dev/null 2>/dev/null
selfserv with PID 54099 found at Tue Nov 27 17:55:32 PST 2012
selfserv with PID 54099 started at Tue Nov 27 17:55:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6886: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54099 at Tue Nov 27 17:55:33 PST 2012
kill -USR1 54099
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54099 killed at Tue Nov 27 17:55:33 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54146 >/dev/null 2>/dev/null
selfserv with PID 54146 found at Tue Nov 27 17:55:33 PST 2012
selfserv with PID 54146 started at Tue Nov 27 17:55:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6887: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54146 at Tue Nov 27 17:55:33 PST 2012
kill -USR1 54146
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54146 killed at Tue Nov 27 17:55:33 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54205 >/dev/null 2>/dev/null
selfserv with PID 54205 found at Tue Nov 27 17:55:33 PST 2012
selfserv with PID 54205 started at Tue Nov 27 17:55:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6888: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54205 at Tue Nov 27 17:55:34 PST 2012
kill -USR1 54205
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54205 killed at Tue Nov 27 17:55:34 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54252 >/dev/null 2>/dev/null
selfserv with PID 54252 found at Tue Nov 27 17:55:34 PST 2012
selfserv with PID 54252 started at Tue Nov 27 17:55:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6889: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54252 at Tue Nov 27 17:55:34 PST 2012
kill -USR1 54252
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54252 killed at Tue Nov 27 17:55:34 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54299 >/dev/null 2>/dev/null
selfserv with PID 54299 found at Tue Nov 27 17:55:34 PST 2012
selfserv with PID 54299 started at Tue Nov 27 17:55:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6890: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54299 at Tue Nov 27 17:55:35 PST 2012
kill -USR1 54299
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54299 killed at Tue Nov 27 17:55:35 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54358 >/dev/null 2>/dev/null
selfserv with PID 54358 found at Tue Nov 27 17:55:35 PST 2012
selfserv with PID 54358 started at Tue Nov 27 17:55:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6891: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54358 at Tue Nov 27 17:55:35 PST 2012
kill -USR1 54358
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54358 killed at Tue Nov 27 17:55:35 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54405 >/dev/null 2>/dev/null
selfserv with PID 54405 found at Tue Nov 27 17:55:35 PST 2012
selfserv with PID 54405 started at Tue Nov 27 17:55:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6892: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54405 at Tue Nov 27 17:55:35 PST 2012
kill -USR1 54405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54405 killed at Tue Nov 27 17:55:35 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 17:55:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54452 >/dev/null 2>/dev/null
selfserv with PID 54452 found at Tue Nov 27 17:55:36 PST 2012
selfserv with PID 54452 started at Tue Nov 27 17:55:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6893: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54452 at Tue Nov 27 17:55:36 PST 2012
kill -USR1 54452
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54452 killed at Tue Nov 27 17:55:36 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54511 >/dev/null 2>/dev/null
selfserv with PID 54511 found at Tue Nov 27 17:55:36 PST 2012
selfserv with PID 54511 started at Tue Nov 27 17:55:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6894: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54511 at Tue Nov 27 17:55:36 PST 2012
kill -USR1 54511
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54511 killed at Tue Nov 27 17:55:36 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54558 >/dev/null 2>/dev/null
selfserv with PID 54558 found at Tue Nov 27 17:55:36 PST 2012
selfserv with PID 54558 started at Tue Nov 27 17:55:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6895: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54558 at Tue Nov 27 17:55:37 PST 2012
kill -USR1 54558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54558 killed at Tue Nov 27 17:55:37 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:55:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54605 >/dev/null 2>/dev/null
selfserv with PID 54605 found at Tue Nov 27 17:55:37 PST 2012
selfserv with PID 54605 started at Tue Nov 27 17:55:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6896: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 54605 at Tue Nov 27 17:55:37 PST 2012
kill -USR1 54605
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54605 killed at Tue Nov 27 17:55:37 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54665 >/dev/null 2>/dev/null
selfserv with PID 54665 found at Tue Nov 27 17:55:37 PST 2012
selfserv with PID 54665 started at Tue Nov 27 17:55:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6897: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54665 at Tue Nov 27 17:55:38 PST 2012
kill -USR1 54665
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54665 killed at Tue Nov 27 17:55:38 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54712 >/dev/null 2>/dev/null
selfserv with PID 54712 found at Tue Nov 27 17:55:38 PST 2012
selfserv with PID 54712 started at Tue Nov 27 17:55:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6898: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54712 at Tue Nov 27 17:55:38 PST 2012
kill -USR1 54712
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54712 killed at Tue Nov 27 17:55:38 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54759 >/dev/null 2>/dev/null
selfserv with PID 54759 found at Tue Nov 27 17:55:38 PST 2012
selfserv with PID 54759 started at Tue Nov 27 17:55:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6899: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54759 at Tue Nov 27 17:55:39 PST 2012
kill -USR1 54759
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54759 killed at Tue Nov 27 17:55:39 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54818 >/dev/null 2>/dev/null
selfserv with PID 54818 found at Tue Nov 27 17:55:39 PST 2012
selfserv with PID 54818 started at Tue Nov 27 17:55:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6900: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54818 at Tue Nov 27 17:55:39 PST 2012
kill -USR1 54818
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54818 killed at Tue Nov 27 17:55:39 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54865 >/dev/null 2>/dev/null
selfserv with PID 54865 found at Tue Nov 27 17:55:39 PST 2012
selfserv with PID 54865 started at Tue Nov 27 17:55:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6901: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54865 at Tue Nov 27 17:55:40 PST 2012
kill -USR1 54865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54865 killed at Tue Nov 27 17:55:40 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54912 >/dev/null 2>/dev/null
selfserv with PID 54912 found at Tue Nov 27 17:55:40 PST 2012
selfserv with PID 54912 started at Tue Nov 27 17:55:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6902: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 54912 at Tue Nov 27 17:55:40 PST 2012
kill -USR1 54912
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54912 killed at Tue Nov 27 17:55:40 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 54971 >/dev/null 2>/dev/null
selfserv with PID 54971 found at Tue Nov 27 17:55:40 PST 2012
selfserv with PID 54971 started at Tue Nov 27 17:55:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6903: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 54971 at Tue Nov 27 17:55:40 PST 2012
kill -USR1 54971
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 54971 killed at Tue Nov 27 17:55:40 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55018 >/dev/null 2>/dev/null
selfserv with PID 55018 found at Tue Nov 27 17:55:41 PST 2012
selfserv with PID 55018 started at Tue Nov 27 17:55:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6904: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55018 at Tue Nov 27 17:55:41 PST 2012
kill -USR1 55018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55018 killed at Tue Nov 27 17:55:41 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55065 >/dev/null 2>/dev/null
selfserv with PID 55065 found at Tue Nov 27 17:55:41 PST 2012
selfserv with PID 55065 started at Tue Nov 27 17:55:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6905: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55065 at Tue Nov 27 17:55:41 PST 2012
kill -USR1 55065
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55065 killed at Tue Nov 27 17:55:41 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55124 >/dev/null 2>/dev/null
selfserv with PID 55124 found at Tue Nov 27 17:55:42 PST 2012
selfserv with PID 55124 started at Tue Nov 27 17:55:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6906: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55124 at Tue Nov 27 17:55:42 PST 2012
kill -USR1 55124
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55124 killed at Tue Nov 27 17:55:42 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55171 >/dev/null 2>/dev/null
selfserv with PID 55171 found at Tue Nov 27 17:55:42 PST 2012
selfserv with PID 55171 started at Tue Nov 27 17:55:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6907: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55171 at Tue Nov 27 17:55:42 PST 2012
kill -USR1 55171
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55171 killed at Tue Nov 27 17:55:42 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55218 >/dev/null 2>/dev/null
selfserv with PID 55218 found at Tue Nov 27 17:55:42 PST 2012
selfserv with PID 55218 started at Tue Nov 27 17:55:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6908: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55218 at Tue Nov 27 17:55:43 PST 2012
kill -USR1 55218
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55218 killed at Tue Nov 27 17:55:43 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55277 >/dev/null 2>/dev/null
selfserv with PID 55277 found at Tue Nov 27 17:55:43 PST 2012
selfserv with PID 55277 started at Tue Nov 27 17:55:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6909: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55277 at Tue Nov 27 17:55:43 PST 2012
kill -USR1 55277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55277 killed at Tue Nov 27 17:55:43 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55324 >/dev/null 2>/dev/null
selfserv with PID 55324 found at Tue Nov 27 17:55:43 PST 2012
selfserv with PID 55324 started at Tue Nov 27 17:55:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6910: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55324 at Tue Nov 27 17:55:44 PST 2012
kill -USR1 55324
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55324 killed at Tue Nov 27 17:55:44 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55371 >/dev/null 2>/dev/null
selfserv with PID 55371 found at Tue Nov 27 17:55:44 PST 2012
selfserv with PID 55371 started at Tue Nov 27 17:55:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6911: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55371 at Tue Nov 27 17:55:44 PST 2012
kill -USR1 55371
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55371 killed at Tue Nov 27 17:55:44 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55430 >/dev/null 2>/dev/null
selfserv with PID 55430 found at Tue Nov 27 17:55:44 PST 2012
selfserv with PID 55430 started at Tue Nov 27 17:55:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6912: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55430 at Tue Nov 27 17:55:45 PST 2012
kill -USR1 55430
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55430 killed at Tue Nov 27 17:55:45 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55487 >/dev/null 2>/dev/null
selfserv with PID 55487 found at Tue Nov 27 17:55:45 PST 2012
selfserv with PID 55487 started at Tue Nov 27 17:55:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6913: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55487 at Tue Nov 27 17:55:45 PST 2012
kill -USR1 55487
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55487 killed at Tue Nov 27 17:55:45 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55534 >/dev/null 2>/dev/null
selfserv with PID 55534 found at Tue Nov 27 17:55:45 PST 2012
selfserv with PID 55534 started at Tue Nov 27 17:55:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6914: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55534 at Tue Nov 27 17:55:46 PST 2012
kill -USR1 55534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55534 killed at Tue Nov 27 17:55:46 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55593 >/dev/null 2>/dev/null
selfserv with PID 55593 found at Tue Nov 27 17:55:46 PST 2012
selfserv with PID 55593 started at Tue Nov 27 17:55:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6915: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55593 at Tue Nov 27 17:55:46 PST 2012
kill -USR1 55593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55593 killed at Tue Nov 27 17:55:46 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55640 >/dev/null 2>/dev/null
selfserv with PID 55640 found at Tue Nov 27 17:55:46 PST 2012
selfserv with PID 55640 started at Tue Nov 27 17:55:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6916: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55640 at Tue Nov 27 17:55:47 PST 2012
kill -USR1 55640
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55640 killed at Tue Nov 27 17:55:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55687 >/dev/null 2>/dev/null
selfserv with PID 55687 found at Tue Nov 27 17:55:47 PST 2012
selfserv with PID 55687 started at Tue Nov 27 17:55:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6917: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55687 at Tue Nov 27 17:55:47 PST 2012
kill -USR1 55687
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55687 killed at Tue Nov 27 17:55:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55746 >/dev/null 2>/dev/null
selfserv with PID 55746 found at Tue Nov 27 17:55:47 PST 2012
selfserv with PID 55746 started at Tue Nov 27 17:55:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6918: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55746 at Tue Nov 27 17:55:47 PST 2012
kill -USR1 55746
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55746 killed at Tue Nov 27 17:55:47 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55793 >/dev/null 2>/dev/null
selfserv with PID 55793 found at Tue Nov 27 17:55:48 PST 2012
selfserv with PID 55793 started at Tue Nov 27 17:55:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6919: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55793 at Tue Nov 27 17:55:48 PST 2012
kill -USR1 55793
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55793 killed at Tue Nov 27 17:55:48 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55840 >/dev/null 2>/dev/null
selfserv with PID 55840 found at Tue Nov 27 17:55:48 PST 2012
selfserv with PID 55840 started at Tue Nov 27 17:55:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6920: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55840 at Tue Nov 27 17:55:48 PST 2012
kill -USR1 55840
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55840 killed at Tue Nov 27 17:55:48 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55899 >/dev/null 2>/dev/null
selfserv with PID 55899 found at Tue Nov 27 17:55:48 PST 2012
selfserv with PID 55899 started at Tue Nov 27 17:55:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6921: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55899 at Tue Nov 27 17:55:49 PST 2012
kill -USR1 55899
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55899 killed at Tue Nov 27 17:55:49 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55946 >/dev/null 2>/dev/null
selfserv with PID 55946 found at Tue Nov 27 17:55:49 PST 2012
selfserv with PID 55946 started at Tue Nov 27 17:55:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6922: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 55946 at Tue Nov 27 17:55:49 PST 2012
kill -USR1 55946
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55946 killed at Tue Nov 27 17:55:49 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 55993 >/dev/null 2>/dev/null
selfserv with PID 55993 found at Tue Nov 27 17:55:49 PST 2012
selfserv with PID 55993 started at Tue Nov 27 17:55:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6923: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 55993 at Tue Nov 27 17:55:50 PST 2012
kill -USR1 55993
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 55993 killed at Tue Nov 27 17:55:50 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56052 >/dev/null 2>/dev/null
selfserv with PID 56052 found at Tue Nov 27 17:55:50 PST 2012
selfserv with PID 56052 started at Tue Nov 27 17:55:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6924: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56052 at Tue Nov 27 17:55:50 PST 2012
kill -USR1 56052
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56052 killed at Tue Nov 27 17:55:50 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56099 >/dev/null 2>/dev/null
selfserv with PID 56099 found at Tue Nov 27 17:55:50 PST 2012
selfserv with PID 56099 started at Tue Nov 27 17:55:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6925: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56099 at Tue Nov 27 17:55:51 PST 2012
kill -USR1 56099
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56099 killed at Tue Nov 27 17:55:51 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56146 >/dev/null 2>/dev/null
selfserv with PID 56146 found at Tue Nov 27 17:55:51 PST 2012
selfserv with PID 56146 started at Tue Nov 27 17:55:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6926: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56146 at Tue Nov 27 17:55:52 PST 2012
kill -USR1 56146
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56146 killed at Tue Nov 27 17:55:52 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56205 >/dev/null 2>/dev/null
selfserv with PID 56205 found at Tue Nov 27 17:55:52 PST 2012
selfserv with PID 56205 started at Tue Nov 27 17:55:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6927: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56205 at Tue Nov 27 17:55:52 PST 2012
kill -USR1 56205
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56205 killed at Tue Nov 27 17:55:52 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56252 >/dev/null 2>/dev/null
selfserv with PID 56252 found at Tue Nov 27 17:55:52 PST 2012
selfserv with PID 56252 started at Tue Nov 27 17:55:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6928: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56252 at Tue Nov 27 17:55:53 PST 2012
kill -USR1 56252
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56252 killed at Tue Nov 27 17:55:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56299 >/dev/null 2>/dev/null
selfserv with PID 56299 found at Tue Nov 27 17:55:53 PST 2012
selfserv with PID 56299 started at Tue Nov 27 17:55:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6929: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56299 at Tue Nov 27 17:55:53 PST 2012
kill -USR1 56299
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56299 killed at Tue Nov 27 17:55:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56358 >/dev/null 2>/dev/null
selfserv with PID 56358 found at Tue Nov 27 17:55:53 PST 2012
selfserv with PID 56358 started at Tue Nov 27 17:55:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6930: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56358 at Tue Nov 27 17:55:53 PST 2012
kill -USR1 56358
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56358 killed at Tue Nov 27 17:55:53 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56405 >/dev/null 2>/dev/null
selfserv with PID 56405 found at Tue Nov 27 17:55:54 PST 2012
selfserv with PID 56405 started at Tue Nov 27 17:55:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6931: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56405 at Tue Nov 27 17:55:54 PST 2012
kill -USR1 56405
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56405 killed at Tue Nov 27 17:55:54 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56452 >/dev/null 2>/dev/null
selfserv with PID 56452 found at Tue Nov 27 17:55:54 PST 2012
selfserv with PID 56452 started at Tue Nov 27 17:55:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6932: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56452 at Tue Nov 27 17:55:54 PST 2012
kill -USR1 56452
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56452 killed at Tue Nov 27 17:55:54 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56511 >/dev/null 2>/dev/null
selfserv with PID 56511 found at Tue Nov 27 17:55:55 PST 2012
selfserv with PID 56511 started at Tue Nov 27 17:55:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6933: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56511 at Tue Nov 27 17:55:55 PST 2012
kill -USR1 56511
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56511 killed at Tue Nov 27 17:55:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56558 >/dev/null 2>/dev/null
selfserv with PID 56558 found at Tue Nov 27 17:55:55 PST 2012
selfserv with PID 56558 started at Tue Nov 27 17:55:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6934: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56558 at Tue Nov 27 17:55:55 PST 2012
kill -USR1 56558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56558 killed at Tue Nov 27 17:55:55 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56605 >/dev/null 2>/dev/null
selfserv with PID 56605 found at Tue Nov 27 17:55:55 PST 2012
selfserv with PID 56605 started at Tue Nov 27 17:55:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6935: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56605 at Tue Nov 27 17:55:56 PST 2012
kill -USR1 56605
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56605 killed at Tue Nov 27 17:55:56 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56664 >/dev/null 2>/dev/null
selfserv with PID 56664 found at Tue Nov 27 17:55:56 PST 2012
selfserv with PID 56664 started at Tue Nov 27 17:55:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6936: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56664 at Tue Nov 27 17:55:56 PST 2012
kill -USR1 56664
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56664 killed at Tue Nov 27 17:55:56 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56711 >/dev/null 2>/dev/null
selfserv with PID 56711 found at Tue Nov 27 17:55:56 PST 2012
selfserv with PID 56711 started at Tue Nov 27 17:55:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6937: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56711 at Tue Nov 27 17:55:57 PST 2012
kill -USR1 56711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56711 killed at Tue Nov 27 17:55:57 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:55:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56758 >/dev/null 2>/dev/null
selfserv with PID 56758 found at Tue Nov 27 17:55:57 PST 2012
selfserv with PID 56758 started at Tue Nov 27 17:55:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6938: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56758 at Tue Nov 27 17:55:57 PST 2012
kill -USR1 56758
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56758 killed at Tue Nov 27 17:55:57 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56817 >/dev/null 2>/dev/null
selfserv with PID 56817 found at Tue Nov 27 17:55:57 PST 2012
selfserv with PID 56817 started at Tue Nov 27 17:55:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6939: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56817 at Tue Nov 27 17:55:58 PST 2012
kill -USR1 56817
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56817 killed at Tue Nov 27 17:55:58 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56864 >/dev/null 2>/dev/null
selfserv with PID 56864 found at Tue Nov 27 17:55:58 PST 2012
selfserv with PID 56864 started at Tue Nov 27 17:55:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6940: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 56864 at Tue Nov 27 17:55:58 PST 2012
kill -USR1 56864
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56864 killed at Tue Nov 27 17:55:58 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:55:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56911 >/dev/null 2>/dev/null
selfserv with PID 56911 found at Tue Nov 27 17:55:58 PST 2012
selfserv with PID 56911 started at Tue Nov 27 17:55:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6941: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56911 at Tue Nov 27 17:55:59 PST 2012
kill -USR1 56911
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56911 killed at Tue Nov 27 17:55:59 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 56970 >/dev/null 2>/dev/null
selfserv with PID 56970 found at Tue Nov 27 17:55:59 PST 2012
selfserv with PID 56970 started at Tue Nov 27 17:55:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6942: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 56970 at Tue Nov 27 17:55:59 PST 2012
kill -USR1 56970
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 56970 killed at Tue Nov 27 17:55:59 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57017 >/dev/null 2>/dev/null
selfserv with PID 57017 found at Tue Nov 27 17:55:59 PST 2012
selfserv with PID 57017 started at Tue Nov 27 17:55:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6943: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57017 at Tue Nov 27 17:55:59 PST 2012
kill -USR1 57017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57017 killed at Tue Nov 27 17:55:59 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 17:55:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:55:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57064 >/dev/null 2>/dev/null
selfserv with PID 57064 found at Tue Nov 27 17:56:00 PST 2012
selfserv with PID 57064 started at Tue Nov 27 17:56:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6944: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57064 at Tue Nov 27 17:56:00 PST 2012
kill -USR1 57064
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57064 killed at Tue Nov 27 17:56:00 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:56:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57123 >/dev/null 2>/dev/null
selfserv with PID 57123 found at Tue Nov 27 17:56:00 PST 2012
selfserv with PID 57123 started at Tue Nov 27 17:56:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6945: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57123 at Tue Nov 27 17:56:00 PST 2012
kill -USR1 57123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57123 killed at Tue Nov 27 17:56:00 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:56:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57170 >/dev/null 2>/dev/null
selfserv with PID 57170 found at Tue Nov 27 17:56:00 PST 2012
selfserv with PID 57170 started at Tue Nov 27 17:56:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6946: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57170 at Tue Nov 27 17:56:01 PST 2012
kill -USR1 57170
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57170 killed at Tue Nov 27 17:56:01 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 17:56:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57217 >/dev/null 2>/dev/null
selfserv with PID 57217 found at Tue Nov 27 17:56:01 PST 2012
selfserv with PID 57217 started at Tue Nov 27 17:56:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6947: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57217 at Tue Nov 27 17:56:01 PST 2012
kill -USR1 57217
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57217 killed at Tue Nov 27 17:56:01 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:56:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57276 >/dev/null 2>/dev/null
selfserv with PID 57276 found at Tue Nov 27 17:56:01 PST 2012
selfserv with PID 57276 started at Tue Nov 27 17:56:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6948: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57276 at Tue Nov 27 17:56:02 PST 2012
kill -USR1 57276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57276 killed at Tue Nov 27 17:56:02 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:56:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57323 >/dev/null 2>/dev/null
selfserv with PID 57323 found at Tue Nov 27 17:56:02 PST 2012
selfserv with PID 57323 started at Tue Nov 27 17:56:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6949: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 57323 at Tue Nov 27 17:56:02 PST 2012
kill -USR1 57323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57323 killed at Tue Nov 27 17:56:02 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:56:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57370 >/dev/null 2>/dev/null
selfserv with PID 57370 found at Tue Nov 27 17:56:02 PST 2012
selfserv with PID 57370 started at Tue Nov 27 17:56:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6950: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 57370 at Tue Nov 27 17:56:03 PST 2012
kill -USR1 57370
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57370 killed at Tue Nov 27 17:56:03 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57438 >/dev/null 2>/dev/null
selfserv with PID 57438 found at Tue Nov 27 17:56:03 PST 2012
selfserv with PID 57438 started at Tue Nov 27 17:56:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6951: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 57438 at Tue Nov 27 17:56:03 PST 2012
kill -USR1 57438
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57438 killed at Tue Nov 27 17:56:03 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57485 >/dev/null 2>/dev/null
selfserv with PID 57485 found at Tue Nov 27 17:56:03 PST 2012
selfserv with PID 57485 started at Tue Nov 27 17:56:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6952: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 57485 at Tue Nov 27 17:56:04 PST 2012
kill -USR1 57485
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57485 killed at Tue Nov 27 17:56:04 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57532 >/dev/null 2>/dev/null
selfserv with PID 57532 found at Tue Nov 27 17:56:04 PST 2012
selfserv with PID 57532 started at Tue Nov 27 17:56:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6953: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 57532 at Tue Nov 27 17:56:04 PST 2012
kill -USR1 57532
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57532 killed at Tue Nov 27 17:56:04 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57591 >/dev/null 2>/dev/null
selfserv with PID 57591 found at Tue Nov 27 17:56:04 PST 2012
selfserv with PID 57591 started at Tue Nov 27 17:56:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6954: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57591 at Tue Nov 27 17:56:04 PST 2012
kill -USR1 57591
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57591 killed at Tue Nov 27 17:56:04 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57638 >/dev/null 2>/dev/null
selfserv with PID 57638 found at Tue Nov 27 17:56:05 PST 2012
selfserv with PID 57638 started at Tue Nov 27 17:56:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6955: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 57638 at Tue Nov 27 17:56:05 PST 2012
kill -USR1 57638
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57638 killed at Tue Nov 27 17:56:05 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57685 >/dev/null 2>/dev/null
selfserv with PID 57685 found at Tue Nov 27 17:56:05 PST 2012
selfserv with PID 57685 started at Tue Nov 27 17:56:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6956: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57685 at Tue Nov 27 17:56:05 PST 2012
kill -USR1 57685
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57685 killed at Tue Nov 27 17:56:05 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57744 >/dev/null 2>/dev/null
selfserv with PID 57744 found at Tue Nov 27 17:56:06 PST 2012
selfserv with PID 57744 started at Tue Nov 27 17:56:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6957: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57744 at Tue Nov 27 17:56:06 PST 2012
kill -USR1 57744
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57744 killed at Tue Nov 27 17:56:06 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57791 >/dev/null 2>/dev/null
selfserv with PID 57791 found at Tue Nov 27 17:56:06 PST 2012
selfserv with PID 57791 started at Tue Nov 27 17:56:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6958: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57791 at Tue Nov 27 17:56:06 PST 2012
kill -USR1 57791
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57791 killed at Tue Nov 27 17:56:06 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57838 >/dev/null 2>/dev/null
selfserv with PID 57838 found at Tue Nov 27 17:56:06 PST 2012
selfserv with PID 57838 started at Tue Nov 27 17:56:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6959: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57838 at Tue Nov 27 17:56:07 PST 2012
kill -USR1 57838
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57838 killed at Tue Nov 27 17:56:07 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57897 >/dev/null 2>/dev/null
selfserv with PID 57897 found at Tue Nov 27 17:56:07 PST 2012
selfserv with PID 57897 started at Tue Nov 27 17:56:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6960: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57897 at Tue Nov 27 17:56:07 PST 2012
kill -USR1 57897
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57897 killed at Tue Nov 27 17:56:07 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57944 >/dev/null 2>/dev/null
selfserv with PID 57944 found at Tue Nov 27 17:56:07 PST 2012
selfserv with PID 57944 started at Tue Nov 27 17:56:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6961: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 57944 at Tue Nov 27 17:56:08 PST 2012
kill -USR1 57944
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57944 killed at Tue Nov 27 17:56:08 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 57991 >/dev/null 2>/dev/null
selfserv with PID 57991 found at Tue Nov 27 17:56:08 PST 2012
selfserv with PID 57991 started at Tue Nov 27 17:56:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6962: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 57991 at Tue Nov 27 17:56:08 PST 2012
kill -USR1 57991
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 57991 killed at Tue Nov 27 17:56:08 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58050 >/dev/null 2>/dev/null
selfserv with PID 58050 found at Tue Nov 27 17:56:08 PST 2012
selfserv with PID 58050 started at Tue Nov 27 17:56:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6963: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58050 at Tue Nov 27 17:56:09 PST 2012
kill -USR1 58050
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58050 killed at Tue Nov 27 17:56:09 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58097 >/dev/null 2>/dev/null
selfserv with PID 58097 found at Tue Nov 27 17:56:09 PST 2012
selfserv with PID 58097 started at Tue Nov 27 17:56:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6964: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58097 at Tue Nov 27 17:56:09 PST 2012
kill -USR1 58097
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58097 killed at Tue Nov 27 17:56:09 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58144 >/dev/null 2>/dev/null
selfserv with PID 58144 found at Tue Nov 27 17:56:09 PST 2012
selfserv with PID 58144 started at Tue Nov 27 17:56:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6965: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58144 at Tue Nov 27 17:56:10 PST 2012
kill -USR1 58144
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58144 killed at Tue Nov 27 17:56:10 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58203 >/dev/null 2>/dev/null
selfserv with PID 58203 found at Tue Nov 27 17:56:10 PST 2012
selfserv with PID 58203 started at Tue Nov 27 17:56:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6966: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58203 at Tue Nov 27 17:56:10 PST 2012
kill -USR1 58203
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58203 killed at Tue Nov 27 17:56:10 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58250 >/dev/null 2>/dev/null
selfserv with PID 58250 found at Tue Nov 27 17:56:10 PST 2012
selfserv with PID 58250 started at Tue Nov 27 17:56:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6967: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58250 at Tue Nov 27 17:56:11 PST 2012
kill -USR1 58250
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58250 killed at Tue Nov 27 17:56:11 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58297 >/dev/null 2>/dev/null
selfserv with PID 58297 found at Tue Nov 27 17:56:11 PST 2012
selfserv with PID 58297 started at Tue Nov 27 17:56:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6968: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58297 at Tue Nov 27 17:56:11 PST 2012
kill -USR1 58297
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58297 killed at Tue Nov 27 17:56:11 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58356 >/dev/null 2>/dev/null
selfserv with PID 58356 found at Tue Nov 27 17:56:11 PST 2012
selfserv with PID 58356 started at Tue Nov 27 17:56:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6969: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58356 at Tue Nov 27 17:56:12 PST 2012
kill -USR1 58356
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58356 killed at Tue Nov 27 17:56:12 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58403 >/dev/null 2>/dev/null
selfserv with PID 58403 found at Tue Nov 27 17:56:12 PST 2012
selfserv with PID 58403 started at Tue Nov 27 17:56:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6970: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58403 at Tue Nov 27 17:56:12 PST 2012
kill -USR1 58403
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58403 killed at Tue Nov 27 17:56:12 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58450 >/dev/null 2>/dev/null
selfserv with PID 58450 found at Tue Nov 27 17:56:12 PST 2012
selfserv with PID 58450 started at Tue Nov 27 17:56:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6971: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58450 at Tue Nov 27 17:56:13 PST 2012
kill -USR1 58450
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58450 killed at Tue Nov 27 17:56:13 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58509 >/dev/null 2>/dev/null
selfserv with PID 58509 found at Tue Nov 27 17:56:13 PST 2012
selfserv with PID 58509 started at Tue Nov 27 17:56:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6972: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58509 at Tue Nov 27 17:56:13 PST 2012
kill -USR1 58509
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58509 killed at Tue Nov 27 17:56:13 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58556 >/dev/null 2>/dev/null
selfserv with PID 58556 found at Tue Nov 27 17:56:13 PST 2012
selfserv with PID 58556 started at Tue Nov 27 17:56:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6973: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58556 at Tue Nov 27 17:56:14 PST 2012
kill -USR1 58556
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58556 killed at Tue Nov 27 17:56:14 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58603 >/dev/null 2>/dev/null
selfserv with PID 58603 found at Tue Nov 27 17:56:14 PST 2012
selfserv with PID 58603 started at Tue Nov 27 17:56:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #6974: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 58603 at Tue Nov 27 17:56:14 PST 2012
kill -USR1 58603
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58603 killed at Tue Nov 27 17:56:14 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58662 >/dev/null 2>/dev/null
selfserv with PID 58662 found at Tue Nov 27 17:56:14 PST 2012
selfserv with PID 58662 started at Tue Nov 27 17:56:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6975: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58662 at Tue Nov 27 17:56:14 PST 2012
kill -USR1 58662
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58662 killed at Tue Nov 27 17:56:14 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58709 >/dev/null 2>/dev/null
selfserv with PID 58709 found at Tue Nov 27 17:56:15 PST 2012
selfserv with PID 58709 started at Tue Nov 27 17:56:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6976: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58709 at Tue Nov 27 17:56:15 PST 2012
kill -USR1 58709
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58709 killed at Tue Nov 27 17:56:15 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58756 >/dev/null 2>/dev/null
selfserv with PID 58756 found at Tue Nov 27 17:56:15 PST 2012
selfserv with PID 58756 started at Tue Nov 27 17:56:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6977: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58756 at Tue Nov 27 17:56:15 PST 2012
kill -USR1 58756
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58756 killed at Tue Nov 27 17:56:15 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58815 >/dev/null 2>/dev/null
selfserv with PID 58815 found at Tue Nov 27 17:56:15 PST 2012
selfserv with PID 58815 started at Tue Nov 27 17:56:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6978: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 58815 at Tue Nov 27 17:56:16 PST 2012
kill -USR1 58815
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58815 killed at Tue Nov 27 17:56:16 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58862 >/dev/null 2>/dev/null
selfserv with PID 58862 found at Tue Nov 27 17:56:16 PST 2012
selfserv with PID 58862 started at Tue Nov 27 17:56:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6979: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 58862 at Tue Nov 27 17:56:16 PST 2012
kill -USR1 58862
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58862 killed at Tue Nov 27 17:56:16 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58910 >/dev/null 2>/dev/null
selfserv with PID 58910 found at Tue Nov 27 17:56:17 PST 2012
selfserv with PID 58910 started at Tue Nov 27 17:56:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6980: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 58910 at Tue Nov 27 17:56:17 PST 2012
kill -USR1 58910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58910 killed at Tue Nov 27 17:56:17 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 58970 >/dev/null 2>/dev/null
selfserv with PID 58970 found at Tue Nov 27 17:56:17 PST 2012
selfserv with PID 58970 started at Tue Nov 27 17:56:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6981: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 58970 at Tue Nov 27 17:56:17 PST 2012
kill -USR1 58970
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 58970 killed at Tue Nov 27 17:56:17 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59017 >/dev/null 2>/dev/null
selfserv with PID 59017 found at Tue Nov 27 17:56:17 PST 2012
selfserv with PID 59017 started at Tue Nov 27 17:56:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6982: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59017 at Tue Nov 27 17:56:18 PST 2012
kill -USR1 59017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59017 killed at Tue Nov 27 17:56:18 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59064 >/dev/null 2>/dev/null
selfserv with PID 59064 found at Tue Nov 27 17:56:18 PST 2012
selfserv with PID 59064 started at Tue Nov 27 17:56:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6983: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59064 at Tue Nov 27 17:56:18 PST 2012
kill -USR1 59064
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59064 killed at Tue Nov 27 17:56:18 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59123 >/dev/null 2>/dev/null
selfserv with PID 59123 found at Tue Nov 27 17:56:18 PST 2012
selfserv with PID 59123 started at Tue Nov 27 17:56:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6984: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59123 at Tue Nov 27 17:56:19 PST 2012
kill -USR1 59123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59123 killed at Tue Nov 27 17:56:19 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59170 >/dev/null 2>/dev/null
selfserv with PID 59170 found at Tue Nov 27 17:56:19 PST 2012
selfserv with PID 59170 started at Tue Nov 27 17:56:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6985: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59170 at Tue Nov 27 17:56:19 PST 2012
kill -USR1 59170
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59170 killed at Tue Nov 27 17:56:19 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59217 >/dev/null 2>/dev/null
selfserv with PID 59217 found at Tue Nov 27 17:56:19 PST 2012
selfserv with PID 59217 started at Tue Nov 27 17:56:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6986: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59217 at Tue Nov 27 17:56:20 PST 2012
kill -USR1 59217
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59217 killed at Tue Nov 27 17:56:20 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59276 >/dev/null 2>/dev/null
selfserv with PID 59276 found at Tue Nov 27 17:56:20 PST 2012
selfserv with PID 59276 started at Tue Nov 27 17:56:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59276 at Tue Nov 27 17:56:20 PST 2012
kill -USR1 59276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59276 killed at Tue Nov 27 17:56:20 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59323 >/dev/null 2>/dev/null
selfserv with PID 59323 found at Tue Nov 27 17:56:20 PST 2012
selfserv with PID 59323 started at Tue Nov 27 17:56:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6988: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59323 at Tue Nov 27 17:56:21 PST 2012
kill -USR1 59323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59323 killed at Tue Nov 27 17:56:21 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59370 >/dev/null 2>/dev/null
selfserv with PID 59370 found at Tue Nov 27 17:56:21 PST 2012
selfserv with PID 59370 started at Tue Nov 27 17:56:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6989: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59370 at Tue Nov 27 17:56:21 PST 2012
kill -USR1 59370
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59370 killed at Tue Nov 27 17:56:21 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59429 >/dev/null 2>/dev/null
selfserv with PID 59429 found at Tue Nov 27 17:56:21 PST 2012
selfserv with PID 59429 started at Tue Nov 27 17:56:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6990: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59429 at Tue Nov 27 17:56:22 PST 2012
kill -USR1 59429
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59429 killed at Tue Nov 27 17:56:22 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59476 >/dev/null 2>/dev/null
selfserv with PID 59476 found at Tue Nov 27 17:56:22 PST 2012
selfserv with PID 59476 started at Tue Nov 27 17:56:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6991: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59476 at Tue Nov 27 17:56:22 PST 2012
kill -USR1 59476
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59476 killed at Tue Nov 27 17:56:22 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59524 >/dev/null 2>/dev/null
selfserv with PID 59524 found at Tue Nov 27 17:56:23 PST 2012
selfserv with PID 59524 started at Tue Nov 27 17:56:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59524 at Tue Nov 27 17:56:23 PST 2012
kill -USR1 59524
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59524 killed at Tue Nov 27 17:56:23 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59583 >/dev/null 2>/dev/null
selfserv with PID 59583 found at Tue Nov 27 17:56:23 PST 2012
selfserv with PID 59583 started at Tue Nov 27 17:56:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6993: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59583 at Tue Nov 27 17:56:23 PST 2012
kill -USR1 59583
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59583 killed at Tue Nov 27 17:56:23 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59630 >/dev/null 2>/dev/null
selfserv with PID 59630 found at Tue Nov 27 17:56:24 PST 2012
selfserv with PID 59630 started at Tue Nov 27 17:56:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59630 at Tue Nov 27 17:56:24 PST 2012
kill -USR1 59630
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59630 killed at Tue Nov 27 17:56:24 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59677 >/dev/null 2>/dev/null
selfserv with PID 59677 found at Tue Nov 27 17:56:24 PST 2012
selfserv with PID 59677 started at Tue Nov 27 17:56:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6995: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59677 at Tue Nov 27 17:56:24 PST 2012
kill -USR1 59677
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59677 killed at Tue Nov 27 17:56:24 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59736 >/dev/null 2>/dev/null
selfserv with PID 59736 found at Tue Nov 27 17:56:24 PST 2012
selfserv with PID 59736 started at Tue Nov 27 17:56:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59736 at Tue Nov 27 17:56:25 PST 2012
kill -USR1 59736
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59736 killed at Tue Nov 27 17:56:25 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59783 >/dev/null 2>/dev/null
selfserv with PID 59783 found at Tue Nov 27 17:56:25 PST 2012
selfserv with PID 59783 started at Tue Nov 27 17:56:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6997: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59783 at Tue Nov 27 17:56:25 PST 2012
kill -USR1 59783
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59783 killed at Tue Nov 27 17:56:25 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59830 >/dev/null 2>/dev/null
selfserv with PID 59830 found at Tue Nov 27 17:56:25 PST 2012
selfserv with PID 59830 started at Tue Nov 27 17:56:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #6998: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 59830 at Tue Nov 27 17:56:26 PST 2012
kill -USR1 59830
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59830 killed at Tue Nov 27 17:56:26 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59889 >/dev/null 2>/dev/null
selfserv with PID 59889 found at Tue Nov 27 17:56:26 PST 2012
selfserv with PID 59889 started at Tue Nov 27 17:56:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6999: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59889 at Tue Nov 27 17:56:26 PST 2012
kill -USR1 59889
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59889 killed at Tue Nov 27 17:56:26 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59936 >/dev/null 2>/dev/null
selfserv with PID 59936 found at Tue Nov 27 17:56:26 PST 2012
selfserv with PID 59936 started at Tue Nov 27 17:56:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7000: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59936 at Tue Nov 27 17:56:27 PST 2012
kill -USR1 59936
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59936 killed at Tue Nov 27 17:56:27 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 59983 >/dev/null 2>/dev/null
selfserv with PID 59983 found at Tue Nov 27 17:56:27 PST 2012
selfserv with PID 59983 started at Tue Nov 27 17:56:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7001: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 59983 at Tue Nov 27 17:56:27 PST 2012
kill -USR1 59983
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 59983 killed at Tue Nov 27 17:56:27 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60042 >/dev/null 2>/dev/null
selfserv with PID 60042 found at Tue Nov 27 17:56:27 PST 2012
selfserv with PID 60042 started at Tue Nov 27 17:56:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7002: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60042 at Tue Nov 27 17:56:28 PST 2012
kill -USR1 60042
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60042 killed at Tue Nov 27 17:56:28 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60089 >/dev/null 2>/dev/null
selfserv with PID 60089 found at Tue Nov 27 17:56:28 PST 2012
selfserv with PID 60089 started at Tue Nov 27 17:56:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7003: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60089 at Tue Nov 27 17:56:28 PST 2012
kill -USR1 60089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60089 killed at Tue Nov 27 17:56:28 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60136 >/dev/null 2>/dev/null
selfserv with PID 60136 found at Tue Nov 27 17:56:28 PST 2012
selfserv with PID 60136 started at Tue Nov 27 17:56:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7004: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60136 at Tue Nov 27 17:56:29 PST 2012
kill -USR1 60136
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60136 killed at Tue Nov 27 17:56:29 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60195 >/dev/null 2>/dev/null
selfserv with PID 60195 found at Tue Nov 27 17:56:29 PST 2012
selfserv with PID 60195 started at Tue Nov 27 17:56:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7005: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60195 at Tue Nov 27 17:56:29 PST 2012
kill -USR1 60195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60195 killed at Tue Nov 27 17:56:29 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60242 >/dev/null 2>/dev/null
selfserv with PID 60242 found at Tue Nov 27 17:56:29 PST 2012
selfserv with PID 60242 started at Tue Nov 27 17:56:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7006: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60242 at Tue Nov 27 17:56:30 PST 2012
kill -USR1 60242
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60242 killed at Tue Nov 27 17:56:30 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 17:56:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60289 >/dev/null 2>/dev/null
selfserv with PID 60289 found at Tue Nov 27 17:56:30 PST 2012
selfserv with PID 60289 started at Tue Nov 27 17:56:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7007: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60289 at Tue Nov 27 17:56:30 PST 2012
kill -USR1 60289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60289 killed at Tue Nov 27 17:56:30 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60348 >/dev/null 2>/dev/null
selfserv with PID 60348 found at Tue Nov 27 17:56:30 PST 2012
selfserv with PID 60348 started at Tue Nov 27 17:56:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7008: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60348 at Tue Nov 27 17:56:31 PST 2012
kill -USR1 60348
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60348 killed at Tue Nov 27 17:56:31 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60395 >/dev/null 2>/dev/null
selfserv with PID 60395 found at Tue Nov 27 17:56:31 PST 2012
selfserv with PID 60395 started at Tue Nov 27 17:56:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7009: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 60395 at Tue Nov 27 17:56:31 PST 2012
kill -USR1 60395
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60395 killed at Tue Nov 27 17:56:31 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:56:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60442 >/dev/null 2>/dev/null
selfserv with PID 60442 found at Tue Nov 27 17:56:31 PST 2012
selfserv with PID 60442 started at Tue Nov 27 17:56:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7010: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 60442 at Tue Nov 27 17:56:31 PST 2012
kill -USR1 60442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60442 killed at Tue Nov 27 17:56:31 PST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/authin.tl.tmp
0
selfserv starting at Tue Nov 27 17:56:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:32 PST 2012
selfserv with PID 60496 started at Tue Nov 27 17:56:32 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:32 PST 2012
ssl.sh: #7011: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:32 PST 2012
ssl.sh: #7012: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:32 PST 2012
ssl.sh: #7013: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:33 PST 2012
ssl.sh: #7014: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:33 PST 2012
ssl.sh: #7015: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:33 PST 2012
ssl.sh: #7016: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:33 PST 2012
ssl.sh: #7017: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:34 PST 2012
ssl.sh: #7018: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:34 PST 2012
ssl.sh: #7019: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:34 PST 2012
ssl.sh: #7020: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:35 PST 2012
ssl.sh: #7021: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:35 PST 2012
ssl.sh: #7022: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:35 PST 2012
ssl.sh: #7023: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:35 PST 2012
================= CRL Reloaded =============
ssl.sh: #7024: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:36 PST 2012
ssl.sh: #7025: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:36 PST 2012
ssl.sh: #7026: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:36 PST 2012
ssl.sh: #7027: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:36 PST 2012
ssl.sh: #7028: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:37 PST 2012
ssl.sh: #7029: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:37 PST 2012
ssl.sh: #7030: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:37 PST 2012
ssl.sh: #7031: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:37 PST 2012
ssl.sh: #7032: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:38 PST 2012
ssl.sh: #7033: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:38 PST 2012
ssl.sh: #7034: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:38 PST 2012
ssl.sh: #7035: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:39 PST 2012
ssl.sh: #7036: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:39 PST 2012
ssl.sh: #7037: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:39 PST 2012
================= CRL Reloaded =============
ssl.sh: #7038: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:39 PST 2012
ssl.sh: #7039: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:40 PST 2012
ssl.sh: #7040: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:40 PST 2012
ssl.sh: #7041: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:40 PST 2012
ssl.sh: #7042: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:40 PST 2012
ssl.sh: #7043: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:41 PST 2012
ssl.sh: #7044: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:41 PST 2012
ssl.sh: #7045: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:41 PST 2012
ssl.sh: #7046: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:41 PST 2012
ssl.sh: #7047: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:42 PST 2012
ssl.sh: #7048: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:42 PST 2012
ssl.sh: #7049: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:42 PST 2012
ssl.sh: #7050: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 60496 >/dev/null 2>/dev/null
selfserv with PID 60496 found at Tue Nov 27 17:56:43 PST 2012
ssl.sh: #7051: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 60496 at Tue Nov 27 17:56:43 PST 2012
kill -USR1 60496
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 60496 killed at Tue Nov 27 17:56:43 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:56:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:43 PST 2012
selfserv with PID 61907 started at Tue Nov 27 17:56:43 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:43 PST 2012
ssl.sh: #7052: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:43 PST 2012
ssl.sh: #7053: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:43 PST 2012
ssl.sh: #7054: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:44 PST 2012
ssl.sh: #7055: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:44 PST 2012
ssl.sh: #7056: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:44 PST 2012
ssl.sh: #7057: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:45 PST 2012
ssl.sh: #7058: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:45 PST 2012
ssl.sh: #7059: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:45 PST 2012
ssl.sh: #7060: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:45 PST 2012
ssl.sh: #7061: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:46 PST 2012
ssl.sh: #7062: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:46 PST 2012
ssl.sh: #7063: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:46 PST 2012
ssl.sh: #7064: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:46 PST 2012
================= CRL Reloaded =============
ssl.sh: #7065: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:47 PST 2012
ssl.sh: #7066: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:47 PST 2012
ssl.sh: #7067: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:47 PST 2012
ssl.sh: #7068: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:47 PST 2012
ssl.sh: #7069: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:48 PST 2012
ssl.sh: #7070: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:48 PST 2012
ssl.sh: #7071: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:48 PST 2012
ssl.sh: #7072: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:49 PST 2012
ssl.sh: #7073: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:49 PST 2012
ssl.sh: #7074: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:49 PST 2012
ssl.sh: #7075: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:49 PST 2012
ssl.sh: #7076: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:50 PST 2012
ssl.sh: #7077: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:50 PST 2012
ssl.sh: #7078: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:50 PST 2012
================= CRL Reloaded =============
ssl.sh: #7079: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:50 PST 2012
ssl.sh: #7080: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:51 PST 2012
ssl.sh: #7081: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:51 PST 2012
ssl.sh: #7082: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:51 PST 2012
ssl.sh: #7083: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:51 PST 2012
ssl.sh: #7084: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:52 PST 2012
ssl.sh: #7085: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:52 PST 2012
ssl.sh: #7086: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:52 PST 2012
ssl.sh: #7087: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:53 PST 2012
ssl.sh: #7088: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:53 PST 2012
ssl.sh: #7089: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:54 PST 2012
ssl.sh: #7090: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:54 PST 2012
ssl.sh: #7091: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 61907 >/dev/null 2>/dev/null
selfserv with PID 61907 found at Tue Nov 27 17:56:54 PST 2012
ssl.sh: #7092: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 61907 at Tue Nov 27 17:56:54 PST 2012
kill -USR1 61907
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 61907 killed at Tue Nov 27 17:56:54 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 17:56:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:56:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:54 PST 2012
selfserv with PID 63328 started at Tue Nov 27 17:56:54 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:55 PST 2012
ssl.sh: #7093: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:55 PST 2012
ssl.sh: #7094: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:55 PST 2012
ssl.sh: #7095: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:55 PST 2012
ssl.sh: #7096: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:56 PST 2012
ssl.sh: #7097: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:56 PST 2012
ssl.sh: #7098: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:56 PST 2012
ssl.sh: #7099: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:57 PST 2012
ssl.sh: #7100: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:57 PST 2012
ssl.sh: #7101: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:57 PST 2012
ssl.sh: #7102: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:57 PST 2012
ssl.sh: #7103: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:58 PST 2012
ssl.sh: #7104: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:58 PST 2012
ssl.sh: #7105: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:58 PST 2012
================= CRL Reloaded =============
ssl.sh: #7106: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:59 PST 2012
ssl.sh: #7107: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:59 PST 2012
ssl.sh: #7108: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:59 PST 2012
ssl.sh: #7109: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:56:59 PST 2012
ssl.sh: #7110: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:00 PST 2012
ssl.sh: #7111: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:00 PST 2012
ssl.sh: #7112: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:00 PST 2012
ssl.sh: #7113: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:01 PST 2012
ssl.sh: #7114: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:01 PST 2012
ssl.sh: #7115: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:01 PST 2012
ssl.sh: #7116: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:01 PST 2012
ssl.sh: #7117: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:02 PST 2012
ssl.sh: #7118: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:02 PST 2012
ssl.sh: #7119: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:02 PST 2012
================= CRL Reloaded =============
ssl.sh: #7120: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:03 PST 2012
ssl.sh: #7121: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:03 PST 2012
ssl.sh: #7122: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:03 PST 2012
ssl.sh: #7123: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:03 PST 2012
ssl.sh: #7124: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:04 PST 2012
ssl.sh: #7125: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:04 PST 2012
ssl.sh: #7126: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:04 PST 2012
ssl.sh: #7127: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:05 PST 2012
ssl.sh: #7128: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:05 PST 2012
ssl.sh: #7129: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:05 PST 2012
ssl.sh: #7130: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:05 PST 2012
ssl.sh: #7131: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:06 PST 2012
ssl.sh: #7132: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 63328 >/dev/null 2>/dev/null
selfserv with PID 63328 found at Tue Nov 27 17:57:06 PST 2012
ssl.sh: #7133: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 63328 at Tue Nov 27 17:57:06 PST 2012
kill -USR1 63328
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 63328 killed at Tue Nov 27 17:57:06 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:57:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:57:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:06 PST 2012
selfserv with PID 64739 started at Tue Nov 27 17:57:06 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:06 PST 2012
ssl.sh: #7134: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:07 PST 2012
ssl.sh: #7135: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:07 PST 2012
ssl.sh: #7136: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:07 PST 2012
ssl.sh: #7137: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:08 PST 2012
ssl.sh: #7138: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:08 PST 2012
ssl.sh: #7139: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:08 PST 2012
ssl.sh: #7140: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:08 PST 2012
ssl.sh: #7141: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:09 PST 2012
ssl.sh: #7142: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:09 PST 2012
ssl.sh: #7143: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:09 PST 2012
ssl.sh: #7144: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:10 PST 2012
ssl.sh: #7145: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:10 PST 2012
ssl.sh: #7146: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:10 PST 2012
================= CRL Reloaded =============
ssl.sh: #7147: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:10 PST 2012
ssl.sh: #7148: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:11 PST 2012
ssl.sh: #7149: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:11 PST 2012
ssl.sh: #7150: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:11 PST 2012
ssl.sh: #7151: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:12 PST 2012
ssl.sh: #7152: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:12 PST 2012
ssl.sh: #7153: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:12 PST 2012
ssl.sh: #7154: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:12 PST 2012
ssl.sh: #7155: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:13 PST 2012
ssl.sh: #7156: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:13 PST 2012
ssl.sh: #7157: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:13 PST 2012
ssl.sh: #7158: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:14 PST 2012
ssl.sh: #7159: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:14 PST 2012
ssl.sh: #7160: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:14 PST 2012
================= CRL Reloaded =============
ssl.sh: #7161: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:14 PST 2012
ssl.sh: #7162: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:15 PST 2012
ssl.sh: #7163: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:15 PST 2012
ssl.sh: #7164: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:15 PST 2012
ssl.sh: #7165: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:16 PST 2012
ssl.sh: #7166: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:16 PST 2012
ssl.sh: #7167: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:16 PST 2012
ssl.sh: #7168: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:16 PST 2012
ssl.sh: #7169: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:17 PST 2012
ssl.sh: #7170: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:17 PST 2012
ssl.sh: #7171: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:17 PST 2012
ssl.sh: #7172: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:18 PST 2012
ssl.sh: #7173: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 64739 >/dev/null 2>/dev/null
selfserv with PID 64739 found at Tue Nov 27 17:57:18 PST 2012
ssl.sh: #7174: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 64739 at Tue Nov 27 17:57:18 PST 2012
kill -USR1 64739
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 64739 killed at Tue Nov 27 17:57:18 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:57:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:57:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66155 >/dev/null 2>/dev/null
selfserv with PID 66155 found at Tue Nov 27 17:57:18 PST 2012
selfserv with PID 66155 started at Tue Nov 27 17:57:18 PST 2012
trying to kill selfserv with PID 66155 at Tue Nov 27 17:57:18 PST 2012
kill -USR1 66155
./ssl.sh: line 173: 66155 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 66155 killed at Tue Nov 27 17:57:18 PST 2012
selfserv starting at Tue Nov 27 17:57:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:57:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:18 PST 2012
selfserv with PID 66188 started at Tue Nov 27 17:57:18 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:18 PST 2012
ssl.sh: #7175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:19 PST 2012
ssl.sh: #7176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:19 PST 2012
ssl.sh: #7177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:19 PST 2012
ssl.sh: #7178: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:19 PST 2012
ssl.sh: #7179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:20 PST 2012
ssl.sh: #7180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:20 PST 2012
ssl.sh: #7181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:20 PST 2012
ssl.sh: #7182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:21 PST 2012
ssl.sh: #7183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:21 PST 2012
ssl.sh: #7184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:21 PST 2012
ssl.sh: #7185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:21 PST 2012
ssl.sh: #7186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:22 PST 2012
ssl.sh: #7187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:22 PST 2012
================= CRL Reloaded =============
ssl.sh: #7188: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:22 PST 2012
ssl.sh: #7189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:22 PST 2012
ssl.sh: #7190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:23 PST 2012
ssl.sh: #7191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:23 PST 2012
ssl.sh: #7192: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:24 PST 2012
ssl.sh: #7193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:24 PST 2012
ssl.sh: #7194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:24 PST 2012
ssl.sh: #7195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:24 PST 2012
ssl.sh: #7196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:25 PST 2012
ssl.sh: #7197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:25 PST 2012
ssl.sh: #7198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:25 PST 2012
ssl.sh: #7199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:26 PST 2012
ssl.sh: #7200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:26 PST 2012
ssl.sh: #7201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:26 PST 2012
================= CRL Reloaded =============
ssl.sh: #7202: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:26 PST 2012
ssl.sh: #7203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:27 PST 2012
ssl.sh: #7204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:27 PST 2012
ssl.sh: #7205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:27 PST 2012
ssl.sh: #7206: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:27 PST 2012
ssl.sh: #7207: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:28 PST 2012
ssl.sh: #7208: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:28 PST 2012
ssl.sh: #7209: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:28 PST 2012
ssl.sh: #7210: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:28 PST 2012
ssl.sh: #7211: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:29 PST 2012
ssl.sh: #7212: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:29 PST 2012
ssl.sh: #7213: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:29 PST 2012
ssl.sh: #7214: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 66188 >/dev/null 2>/dev/null
selfserv with PID 66188 found at Tue Nov 27 17:57:30 PST 2012
ssl.sh: #7215: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 66188 at Tue Nov 27 17:57:30 PST 2012
kill -USR1 66188
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 66188 killed at Tue Nov 27 17:57:30 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:57:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:57:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:30 PST 2012
selfserv with PID 67599 started at Tue Nov 27 17:57:30 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:30 PST 2012
ssl.sh: #7216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:30 PST 2012
ssl.sh: #7217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:31 PST 2012
ssl.sh: #7218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:31 PST 2012
ssl.sh: #7219: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:31 PST 2012
ssl.sh: #7220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:31 PST 2012
ssl.sh: #7221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:32 PST 2012
ssl.sh: #7222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:32 PST 2012
ssl.sh: #7223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:32 PST 2012
ssl.sh: #7224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:32 PST 2012
ssl.sh: #7225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:33 PST 2012
ssl.sh: #7226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:33 PST 2012
ssl.sh: #7227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:33 PST 2012
ssl.sh: #7228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:34 PST 2012
================= CRL Reloaded =============
ssl.sh: #7229: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:34 PST 2012
ssl.sh: #7230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:34 PST 2012
ssl.sh: #7231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:34 PST 2012
ssl.sh: #7232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:35 PST 2012
ssl.sh: #7233: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:35 PST 2012
ssl.sh: #7234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:35 PST 2012
ssl.sh: #7235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:35 PST 2012
ssl.sh: #7236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:36 PST 2012
ssl.sh: #7237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:36 PST 2012
ssl.sh: #7238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:36 PST 2012
ssl.sh: #7239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:37 PST 2012
ssl.sh: #7240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:37 PST 2012
ssl.sh: #7241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:37 PST 2012
ssl.sh: #7242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:37 PST 2012
================= CRL Reloaded =============
ssl.sh: #7243: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:38 PST 2012
ssl.sh: #7244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:38 PST 2012
ssl.sh: #7245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:38 PST 2012
ssl.sh: #7246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:38 PST 2012
ssl.sh: #7247: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:39 PST 2012
ssl.sh: #7248: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:39 PST 2012
ssl.sh: #7249: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:39 PST 2012
ssl.sh: #7250: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:39 PST 2012
ssl.sh: #7251: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:40 PST 2012
ssl.sh: #7252: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:40 PST 2012
ssl.sh: #7253: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:40 PST 2012
ssl.sh: #7254: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:41 PST 2012
ssl.sh: #7255: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 67599 >/dev/null 2>/dev/null
selfserv with PID 67599 found at Tue Nov 27 17:57:41 PST 2012
ssl.sh: #7256: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 67599 at Tue Nov 27 17:57:41 PST 2012
kill -USR1 67599
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 67599 killed at Tue Nov 27 17:57:41 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:57:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:57:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:41 PST 2012
selfserv with PID 69010 started at Tue Nov 27 17:57:41 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:41 PST 2012
ssl.sh: #7257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:42 PST 2012
ssl.sh: #7258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:42 PST 2012
ssl.sh: #7259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:42 PST 2012
ssl.sh: #7260: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:42 PST 2012
ssl.sh: #7261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:43 PST 2012
ssl.sh: #7262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:43 PST 2012
ssl.sh: #7263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:43 PST 2012
ssl.sh: #7264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:43 PST 2012
ssl.sh: #7265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:44 PST 2012
ssl.sh: #7266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:44 PST 2012
ssl.sh: #7267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:44 PST 2012
ssl.sh: #7268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:45 PST 2012
ssl.sh: #7269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:45 PST 2012
================= CRL Reloaded =============
ssl.sh: #7270: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:45 PST 2012
ssl.sh: #7271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:45 PST 2012
ssl.sh: #7272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:46 PST 2012
ssl.sh: #7273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:46 PST 2012
ssl.sh: #7274: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:46 PST 2012
ssl.sh: #7275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:46 PST 2012
ssl.sh: #7276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:47 PST 2012
ssl.sh: #7277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:47 PST 2012
ssl.sh: #7278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:47 PST 2012
ssl.sh: #7279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:48 PST 2012
ssl.sh: #7280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:48 PST 2012
ssl.sh: #7281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:48 PST 2012
ssl.sh: #7282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:48 PST 2012
ssl.sh: #7283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:49 PST 2012
================= CRL Reloaded =============
ssl.sh: #7284: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:49 PST 2012
ssl.sh: #7285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:49 PST 2012
ssl.sh: #7286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:49 PST 2012
ssl.sh: #7287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:50 PST 2012
ssl.sh: #7288: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:50 PST 2012
ssl.sh: #7289: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:50 PST 2012
ssl.sh: #7290: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:50 PST 2012
ssl.sh: #7291: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:51 PST 2012
ssl.sh: #7292: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:51 PST 2012
ssl.sh: #7293: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:51 PST 2012
ssl.sh: #7294: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:52 PST 2012
ssl.sh: #7295: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:52 PST 2012
ssl.sh: #7296: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 69010 >/dev/null 2>/dev/null
selfserv with PID 69010 found at Tue Nov 27 17:57:52 PST 2012
ssl.sh: #7297: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 69010 at Tue Nov 27 17:57:52 PST 2012
kill -USR1 69010
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 69010 killed at Tue Nov 27 17:57:52 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:57:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:57:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:52 PST 2012
selfserv with PID 70434 started at Tue Nov 27 17:57:52 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:53 PST 2012
ssl.sh: #7298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:53 PST 2012
ssl.sh: #7299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:53 PST 2012
ssl.sh: #7300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:54 PST 2012
ssl.sh: #7301: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:54 PST 2012
ssl.sh: #7302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:54 PST 2012
ssl.sh: #7303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:55 PST 2012
ssl.sh: #7310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:56 PST 2012
================= CRL Reloaded =============
ssl.sh: #7311: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:56 PST 2012
ssl.sh: #7312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:56 PST 2012
ssl.sh: #7313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:56 PST 2012
ssl.sh: #7314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:57 PST 2012
ssl.sh: #7315: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:57 PST 2012
ssl.sh: #7316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:57 PST 2012
ssl.sh: #7317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:58 PST 2012
ssl.sh: #7318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:58 PST 2012
ssl.sh: #7319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:58 PST 2012
ssl.sh: #7320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:58 PST 2012
ssl.sh: #7321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:59 PST 2012
ssl.sh: #7322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:59 PST 2012
ssl.sh: #7323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:57:59 PST 2012
ssl.sh: #7324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:00 PST 2012
================= CRL Reloaded =============
ssl.sh: #7325: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:00 PST 2012
ssl.sh: #7326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:00 PST 2012
ssl.sh: #7327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:00 PST 2012
ssl.sh: #7328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:01 PST 2012
ssl.sh: #7329: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:01 PST 2012
ssl.sh: #7330: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:01 PST 2012
ssl.sh: #7331: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:02 PST 2012
ssl.sh: #7332: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:02 PST 2012
ssl.sh: #7333: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:02 PST 2012
ssl.sh: #7334: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:02 PST 2012
ssl.sh: #7335: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:03 PST 2012
ssl.sh: #7336: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:03 PST 2012
ssl.sh: #7337: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 70434 >/dev/null 2>/dev/null
selfserv with PID 70434 found at Tue Nov 27 17:58:03 PST 2012
ssl.sh: #7338: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 70434 at Tue Nov 27 17:58:03 PST 2012
kill -USR1 70434
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 70434 killed at Tue Nov 27 17:58:03 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:58:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:58:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:03 PST 2012
selfserv with PID 71845 started at Tue Nov 27 17:58:03 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:04 PST 2012
ssl.sh: #7339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:04 PST 2012
ssl.sh: #7340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:04 PST 2012
ssl.sh: #7341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:05 PST 2012
ssl.sh: #7342: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:05 PST 2012
ssl.sh: #7343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:05 PST 2012
ssl.sh: #7344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:06 PST 2012
ssl.sh: #7345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:06 PST 2012
ssl.sh: #7346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:06 PST 2012
ssl.sh: #7347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:06 PST 2012
ssl.sh: #7348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:07 PST 2012
ssl.sh: #7349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:07 PST 2012
ssl.sh: #7350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:07 PST 2012
ssl.sh: #7351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:08 PST 2012
================= CRL Reloaded =============
ssl.sh: #7352: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:08 PST 2012
ssl.sh: #7353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:08 PST 2012
ssl.sh: #7354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:08 PST 2012
ssl.sh: #7355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:09 PST 2012
ssl.sh: #7356: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:09 PST 2012
ssl.sh: #7357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:09 PST 2012
ssl.sh: #7358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:10 PST 2012
ssl.sh: #7359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:10 PST 2012
ssl.sh: #7360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:10 PST 2012
ssl.sh: #7361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:10 PST 2012
ssl.sh: #7362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:11 PST 2012
ssl.sh: #7363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:11 PST 2012
ssl.sh: #7364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:11 PST 2012
ssl.sh: #7365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:12 PST 2012
================= CRL Reloaded =============
ssl.sh: #7366: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:12 PST 2012
ssl.sh: #7367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:12 PST 2012
ssl.sh: #7368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:12 PST 2012
ssl.sh: #7369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:13 PST 2012
ssl.sh: #7370: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:13 PST 2012
ssl.sh: #7371: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:13 PST 2012
ssl.sh: #7372: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:14 PST 2012
ssl.sh: #7373: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:14 PST 2012
ssl.sh: #7374: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:14 PST 2012
ssl.sh: #7375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:14 PST 2012
ssl.sh: #7376: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:15 PST 2012
ssl.sh: #7377: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:15 PST 2012
ssl.sh: #7378: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 71845 >/dev/null 2>/dev/null
selfserv with PID 71845 found at Tue Nov 27 17:58:15 PST 2012
ssl.sh: #7379: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 71845 at Tue Nov 27 17:58:15 PST 2012
kill -USR1 71845
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 71845 killed at Tue Nov 27 17:58:15 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:58:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:58:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:15 PST 2012
selfserv with PID 73256 started at Tue Nov 27 17:58:15 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:16 PST 2012
ssl.sh: #7380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:16 PST 2012
ssl.sh: #7381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:16 PST 2012
ssl.sh: #7382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:17 PST 2012
ssl.sh: #7383: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:17 PST 2012
ssl.sh: #7384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:17 PST 2012
ssl.sh: #7385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:18 PST 2012
ssl.sh: #7386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:18 PST 2012
ssl.sh: #7387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:18 PST 2012
ssl.sh: #7388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:18 PST 2012
ssl.sh: #7389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:19 PST 2012
ssl.sh: #7390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:19 PST 2012
ssl.sh: #7391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:19 PST 2012
ssl.sh: #7392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:20 PST 2012
================= CRL Reloaded =============
ssl.sh: #7393: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:20 PST 2012
ssl.sh: #7394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:20 PST 2012
ssl.sh: #7395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:20 PST 2012
ssl.sh: #7396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:21 PST 2012
ssl.sh: #7397: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:21 PST 2012
ssl.sh: #7398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:21 PST 2012
ssl.sh: #7399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:22 PST 2012
ssl.sh: #7400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:22 PST 2012
ssl.sh: #7401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:22 PST 2012
ssl.sh: #7402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:22 PST 2012
ssl.sh: #7403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:23 PST 2012
ssl.sh: #7404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:23 PST 2012
ssl.sh: #7405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:24 PST 2012
ssl.sh: #7406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:24 PST 2012
================= CRL Reloaded =============
ssl.sh: #7407: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:24 PST 2012
ssl.sh: #7408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:24 PST 2012
ssl.sh: #7409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:25 PST 2012
ssl.sh: #7410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:25 PST 2012
ssl.sh: #7411: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:25 PST 2012
ssl.sh: #7412: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:26 PST 2012
ssl.sh: #7413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:26 PST 2012
ssl.sh: #7414: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:26 PST 2012
ssl.sh: #7415: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:26 PST 2012
ssl.sh: #7416: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:27 PST 2012
ssl.sh: #7417: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:27 PST 2012
ssl.sh: #7418: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:27 PST 2012
ssl.sh: #7419: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 73256 >/dev/null 2>/dev/null
selfserv with PID 73256 found at Tue Nov 27 17:58:28 PST 2012
ssl.sh: #7420: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 73256 at Tue Nov 27 17:58:28 PST 2012
kill -USR1 73256
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 73256 killed at Tue Nov 27 17:58:28 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:58:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:58:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 74669 >/dev/null 2>/dev/null
selfserv with PID 74669 found at Tue Nov 27 17:58:28 PST 2012
selfserv with PID 74669 started at Tue Nov 27 17:58:28 PST 2012
trying to kill selfserv with PID 74669 at Tue Nov 27 17:58:28 PST 2012
kill -USR1 74669
./ssl.sh: line 173: 74669 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 74669 killed at Tue Nov 27 17:58:28 PST 2012
selfserv starting at Tue Nov 27 17:58:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:58:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:28 PST 2012
selfserv with PID 74702 started at Tue Nov 27 17:58:28 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:28 PST 2012
ssl.sh: #7421: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:28 PST 2012
ssl.sh: #7422: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:29 PST 2012
ssl.sh: #7423: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:29 PST 2012
ssl.sh: #7424: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:29 PST 2012
ssl.sh: #7425: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:29 PST 2012
ssl.sh: #7426: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:30 PST 2012
ssl.sh: #7427: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:30 PST 2012
ssl.sh: #7428: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:30 PST 2012
ssl.sh: #7429: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:31 PST 2012
ssl.sh: #7430: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:31 PST 2012
ssl.sh: #7431: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:31 PST 2012
ssl.sh: #7432: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:31 PST 2012
ssl.sh: #7433: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:32 PST 2012
================= CRL Reloaded =============
ssl.sh: #7434: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:32 PST 2012
ssl.sh: #7435: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:32 PST 2012
ssl.sh: #7436: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:32 PST 2012
ssl.sh: #7437: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:33 PST 2012
ssl.sh: #7438: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:33 PST 2012
ssl.sh: #7439: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:33 PST 2012
ssl.sh: #7440: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:33 PST 2012
ssl.sh: #7441: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:34 PST 2012
ssl.sh: #7442: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:34 PST 2012
ssl.sh: #7443: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:34 PST 2012
ssl.sh: #7444: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:35 PST 2012
ssl.sh: #7445: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:35 PST 2012
ssl.sh: #7446: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:35 PST 2012
ssl.sh: #7447: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:35 PST 2012
================= CRL Reloaded =============
ssl.sh: #7448: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:36 PST 2012
ssl.sh: #7449: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:36 PST 2012
ssl.sh: #7450: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:36 PST 2012
ssl.sh: #7451: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:36 PST 2012
ssl.sh: #7452: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:37 PST 2012
ssl.sh: #7453: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:37 PST 2012
ssl.sh: #7454: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:37 PST 2012
ssl.sh: #7455: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:37 PST 2012
ssl.sh: #7456: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:38 PST 2012
ssl.sh: #7457: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:38 PST 2012
ssl.sh: #7458: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:38 PST 2012
ssl.sh: #7459: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:39 PST 2012
ssl.sh: #7460: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 74702 >/dev/null 2>/dev/null
selfserv with PID 74702 found at Tue Nov 27 17:58:39 PST 2012
ssl.sh: #7461: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 74702 at Tue Nov 27 17:58:39 PST 2012
kill -USR1 74702
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 74702 killed at Tue Nov 27 17:58:39 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:58:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:58:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:39 PST 2012
selfserv with PID 76113 started at Tue Nov 27 17:58:39 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:39 PST 2012
ssl.sh: #7462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:40 PST 2012
ssl.sh: #7463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:40 PST 2012
ssl.sh: #7464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:40 PST 2012
ssl.sh: #7465: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:40 PST 2012
ssl.sh: #7466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:41 PST 2012
ssl.sh: #7467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:41 PST 2012
ssl.sh: #7468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:41 PST 2012
ssl.sh: #7469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:41 PST 2012
ssl.sh: #7470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:42 PST 2012
ssl.sh: #7471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:42 PST 2012
ssl.sh: #7472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:42 PST 2012
ssl.sh: #7473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:43 PST 2012
ssl.sh: #7474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:43 PST 2012
================= CRL Reloaded =============
ssl.sh: #7475: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:43 PST 2012
ssl.sh: #7476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:43 PST 2012
ssl.sh: #7477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:44 PST 2012
ssl.sh: #7478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:44 PST 2012
ssl.sh: #7479: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:44 PST 2012
ssl.sh: #7480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:44 PST 2012
ssl.sh: #7481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:45 PST 2012
ssl.sh: #7482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:45 PST 2012
ssl.sh: #7483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:45 PST 2012
ssl.sh: #7484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:46 PST 2012
ssl.sh: #7485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:46 PST 2012
ssl.sh: #7486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:46 PST 2012
ssl.sh: #7487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:46 PST 2012
ssl.sh: #7488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:47 PST 2012
================= CRL Reloaded =============
ssl.sh: #7489: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:47 PST 2012
ssl.sh: #7490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:47 PST 2012
ssl.sh: #7491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:47 PST 2012
ssl.sh: #7492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:48 PST 2012
ssl.sh: #7493: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:48 PST 2012
ssl.sh: #7494: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:48 PST 2012
ssl.sh: #7495: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:48 PST 2012
ssl.sh: #7496: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:49 PST 2012
ssl.sh: #7497: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:49 PST 2012
ssl.sh: #7498: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:49 PST 2012
ssl.sh: #7499: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:50 PST 2012
ssl.sh: #7500: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:50 PST 2012
ssl.sh: #7501: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 76113 >/dev/null 2>/dev/null
selfserv with PID 76113 found at Tue Nov 27 17:58:50 PST 2012
ssl.sh: #7502: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 76113 at Tue Nov 27 17:58:50 PST 2012
kill -USR1 76113
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 76113 killed at Tue Nov 27 17:58:50 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:58:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:58:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:50 PST 2012
selfserv with PID 77534 started at Tue Nov 27 17:58:50 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:51 PST 2012
ssl.sh: #7503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:51 PST 2012
ssl.sh: #7504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:51 PST 2012
ssl.sh: #7505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:51 PST 2012
ssl.sh: #7506: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:52 PST 2012
ssl.sh: #7507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:52 PST 2012
ssl.sh: #7508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:52 PST 2012
ssl.sh: #7509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:52 PST 2012
ssl.sh: #7510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:53 PST 2012
ssl.sh: #7511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:53 PST 2012
ssl.sh: #7512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:54 PST 2012
ssl.sh: #7513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:54 PST 2012
ssl.sh: #7514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:54 PST 2012
ssl.sh: #7515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:54 PST 2012
================= CRL Reloaded =============
ssl.sh: #7516: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:55 PST 2012
ssl.sh: #7517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:55 PST 2012
ssl.sh: #7518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:55 PST 2012
ssl.sh: #7519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:55 PST 2012
ssl.sh: #7520: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:56 PST 2012
ssl.sh: #7521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:56 PST 2012
ssl.sh: #7522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:56 PST 2012
ssl.sh: #7523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:56 PST 2012
ssl.sh: #7524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:57 PST 2012
ssl.sh: #7525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:57 PST 2012
ssl.sh: #7526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:57 PST 2012
ssl.sh: #7527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:58 PST 2012
ssl.sh: #7528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:58 PST 2012
ssl.sh: #7529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 174 bytes
tstclnt: Writing 174 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:58 PST 2012
================= CRL Reloaded =============
ssl.sh: #7530: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:58 PST 2012
ssl.sh: #7531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:59 PST 2012
ssl.sh: #7532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:59 PST 2012
ssl.sh: #7533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:59 PST 2012
ssl.sh: #7534: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:58:59 PST 2012
ssl.sh: #7535: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:00 PST 2012
ssl.sh: #7536: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:00 PST 2012
ssl.sh: #7537: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:00 PST 2012
ssl.sh: #7538: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:01 PST 2012
ssl.sh: #7539: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:01 PST 2012
ssl.sh: #7540: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:01 PST 2012
ssl.sh: #7541: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:01 PST 2012
ssl.sh: #7542: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 77534 >/dev/null 2>/dev/null
selfserv with PID 77534 found at Tue Nov 27 17:59:02 PST 2012
ssl.sh: #7543: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 77534 at Tue Nov 27 17:59:02 PST 2012
kill -USR1 77534
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 77534 killed at Tue Nov 27 17:59:02 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 17:59:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:02 PST 2012
selfserv with PID 78945 started at Tue Nov 27 17:59:02 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:02 PST 2012
ssl.sh: #7544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:02 PST 2012
ssl.sh: #7545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:03 PST 2012
ssl.sh: #7546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:03 PST 2012
ssl.sh: #7547: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:03 PST 2012
ssl.sh: #7548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:04 PST 2012
ssl.sh: #7549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:04 PST 2012
ssl.sh: #7550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:04 PST 2012
ssl.sh: #7551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:04 PST 2012
ssl.sh: #7552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:05 PST 2012
ssl.sh: #7553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:05 PST 2012
ssl.sh: #7554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:05 PST 2012
ssl.sh: #7555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:06 PST 2012
ssl.sh: #7556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:06 PST 2012
================= CRL Reloaded =============
ssl.sh: #7557: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:06 PST 2012
ssl.sh: #7558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:06 PST 2012
ssl.sh: #7559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:07 PST 2012
ssl.sh: #7560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:07 PST 2012
ssl.sh: #7561: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:07 PST 2012
ssl.sh: #7562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:08 PST 2012
ssl.sh: #7563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:08 PST 2012
ssl.sh: #7564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:08 PST 2012
ssl.sh: #7565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:08 PST 2012
ssl.sh: #7566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:09 PST 2012
ssl.sh: #7567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:09 PST 2012
ssl.sh: #7568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:09 PST 2012
ssl.sh: #7569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:10 PST 2012
ssl.sh: #7570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:10 PST 2012
================= CRL Reloaded =============
ssl.sh: #7571: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:10 PST 2012
ssl.sh: #7572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:10 PST 2012
ssl.sh: #7573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:11 PST 2012
ssl.sh: #7574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:11 PST 2012
ssl.sh: #7575: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:11 PST 2012
ssl.sh: #7576: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:12 PST 2012
ssl.sh: #7577: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:12 PST 2012
ssl.sh: #7578: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:12 PST 2012
ssl.sh: #7579: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:12 PST 2012
ssl.sh: #7580: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:13 PST 2012
ssl.sh: #7581: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:13 PST 2012
ssl.sh: #7582: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:13 PST 2012
ssl.sh: #7583: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 78945 >/dev/null 2>/dev/null
selfserv with PID 78945 found at Tue Nov 27 17:59:14 PST 2012
ssl.sh: #7584: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 78945 at Tue Nov 27 17:59:14 PST 2012
kill -USR1 78945
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 78945 killed at Tue Nov 27 17:59:14 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:59:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:14 PST 2012
selfserv with PID 80356 started at Tue Nov 27 17:59:14 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:14 PST 2012
ssl.sh: #7585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:14 PST 2012
ssl.sh: #7586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:15 PST 2012
ssl.sh: #7587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:15 PST 2012
ssl.sh: #7588: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:15 PST 2012
ssl.sh: #7589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:16 PST 2012
ssl.sh: #7590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:16 PST 2012
ssl.sh: #7591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:16 PST 2012
ssl.sh: #7592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:16 PST 2012
ssl.sh: #7593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:17 PST 2012
ssl.sh: #7594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:17 PST 2012
ssl.sh: #7595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:17 PST 2012
ssl.sh: #7596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:18 PST 2012
ssl.sh: #7597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:18 PST 2012
================= CRL Reloaded =============
ssl.sh: #7598: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:18 PST 2012
ssl.sh: #7599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:18 PST 2012
ssl.sh: #7600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:19 PST 2012
ssl.sh: #7601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:19 PST 2012
ssl.sh: #7602: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:19 PST 2012
ssl.sh: #7603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:20 PST 2012
ssl.sh: #7604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:20 PST 2012
ssl.sh: #7605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:20 PST 2012
ssl.sh: #7606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:20 PST 2012
ssl.sh: #7607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:21 PST 2012
ssl.sh: #7608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:21 PST 2012
ssl.sh: #7609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:21 PST 2012
ssl.sh: #7610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:22 PST 2012
ssl.sh: #7611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:22 PST 2012
================= CRL Reloaded =============
ssl.sh: #7612: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:22 PST 2012
ssl.sh: #7613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:22 PST 2012
ssl.sh: #7614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:23 PST 2012
ssl.sh: #7615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:23 PST 2012
ssl.sh: #7616: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:24 PST 2012
ssl.sh: #7617: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:24 PST 2012
ssl.sh: #7618: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:24 PST 2012
ssl.sh: #7619: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:25 PST 2012
ssl.sh: #7620: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:25 PST 2012
ssl.sh: #7621: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:25 PST 2012
ssl.sh: #7622: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:25 PST 2012
ssl.sh: #7623: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:26 PST 2012
ssl.sh: #7624: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 80356 >/dev/null 2>/dev/null
selfserv with PID 80356 found at Tue Nov 27 17:59:26 PST 2012
ssl.sh: #7625: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 80356 at Tue Nov 27 17:59:26 PST 2012
kill -USR1 80356
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 80356 killed at Tue Nov 27 17:59:26 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:59:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:26 PST 2012
selfserv with PID 81769 started at Tue Nov 27 17:59:26 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:26 PST 2012
ssl.sh: #7626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:27 PST 2012
ssl.sh: #7627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:27 PST 2012
ssl.sh: #7628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:27 PST 2012
ssl.sh: #7629: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:28 PST 2012
ssl.sh: #7630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:28 PST 2012
ssl.sh: #7631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:28 PST 2012
ssl.sh: #7632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:28 PST 2012
ssl.sh: #7633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:29 PST 2012
ssl.sh: #7634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:29 PST 2012
ssl.sh: #7635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:29 PST 2012
ssl.sh: #7636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:30 PST 2012
ssl.sh: #7637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:30 PST 2012
ssl.sh: #7638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:30 PST 2012
================= CRL Reloaded =============
ssl.sh: #7639: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:30 PST 2012
ssl.sh: #7640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:31 PST 2012
ssl.sh: #7641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:31 PST 2012
ssl.sh: #7642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:31 PST 2012
ssl.sh: #7643: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:32 PST 2012
ssl.sh: #7644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:32 PST 2012
ssl.sh: #7645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:32 PST 2012
ssl.sh: #7646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:32 PST 2012
ssl.sh: #7647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:33 PST 2012
ssl.sh: #7648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:33 PST 2012
ssl.sh: #7649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:33 PST 2012
ssl.sh: #7650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:34 PST 2012
ssl.sh: #7651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:34 PST 2012
ssl.sh: #7652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 177 bytes
tstclnt: Writing 177 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:34 PST 2012
================= CRL Reloaded =============
ssl.sh: #7653: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:34 PST 2012
ssl.sh: #7654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:35 PST 2012
ssl.sh: #7655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:35 PST 2012
ssl.sh: #7656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:35 PST 2012
ssl.sh: #7657: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:36 PST 2012
ssl.sh: #7658: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:36 PST 2012
ssl.sh: #7659: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:36 PST 2012
ssl.sh: #7660: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:36 PST 2012
ssl.sh: #7661: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:37 PST 2012
ssl.sh: #7662: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:37 PST 2012
ssl.sh: #7663: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:37 PST 2012
ssl.sh: #7664: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:38 PST 2012
ssl.sh: #7665: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 81769 >/dev/null 2>/dev/null
selfserv with PID 81769 found at Tue Nov 27 17:59:38 PST 2012
ssl.sh: #7666: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 81769 at Tue Nov 27 17:59:38 PST 2012
kill -USR1 81769
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 81769 killed at Tue Nov 27 17:59:38 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 17:59:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83180 >/dev/null 2>/dev/null
selfserv with PID 83180 found at Tue Nov 27 17:59:38 PST 2012
selfserv with PID 83180 started at Tue Nov 27 17:59:38 PST 2012
trying to kill selfserv with PID 83180 at Tue Nov 27 17:59:38 PST 2012
kill -USR1 83180
./ssl.sh: line 173: 83180 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 83180 killed at Tue Nov 27 17:59:38 PST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:59:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83302 >/dev/null 2>/dev/null
selfserv with PID 83302 found at Tue Nov 27 17:59:38 PST 2012
selfserv with PID 83302 started at Tue Nov 27 17:59:38 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:38 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 17:59:39 PST 2012
ssl.sh: #7667: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83302 at Tue Nov 27 17:59:39 PST 2012
kill -USR1 83302
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83302 killed at Tue Nov 27 17:59:39 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:59:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83360 >/dev/null 2>/dev/null
selfserv with PID 83360 found at Tue Nov 27 17:59:39 PST 2012
selfserv with PID 83360 started at Tue Nov 27 17:59:39 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:39 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:59:40 PST 2012
ssl.sh: #7668: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83360 at Tue Nov 27 17:59:40 PST 2012
kill -USR1 83360
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83360 killed at Tue Nov 27 17:59:40 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 17:59:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83418 >/dev/null 2>/dev/null
selfserv with PID 83418 found at Tue Nov 27 17:59:40 PST 2012
selfserv with PID 83418 started at Tue Nov 27 17:59:40 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:40 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:59:41 PST 2012
ssl.sh: #7669: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83418 at Tue Nov 27 17:59:41 PST 2012
kill -USR1 83418
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83418 killed at Tue Nov 27 17:59:41 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 17:59:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83476 >/dev/null 2>/dev/null
selfserv with PID 83476 found at Tue Nov 27 17:59:42 PST 2012
selfserv with PID 83476 started at Tue Nov 27 17:59:42 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:42 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:59:42 PST 2012
ssl.sh: #7670: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83476 at Tue Nov 27 17:59:43 PST 2012
kill -USR1 83476
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83476 killed at Tue Nov 27 17:59:43 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 17:59:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83534 >/dev/null 2>/dev/null
selfserv with PID 83534 found at Tue Nov 27 17:59:43 PST 2012
selfserv with PID 83534 started at Tue Nov 27 17:59:43 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:43 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:59:44 PST 2012
ssl.sh: #7671: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83534 at Tue Nov 27 17:59:44 PST 2012
kill -USR1 83534
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83534 killed at Tue Nov 27 17:59:44 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 17:59:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83602 >/dev/null 2>/dev/null
selfserv with PID 83602 found at Tue Nov 27 17:59:44 PST 2012
selfserv with PID 83602 started at Tue Nov 27 17:59:44 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:44 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:59:45 PST 2012
ssl.sh: #7672: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83602 at Tue Nov 27 17:59:45 PST 2012
kill -USR1 83602
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83602 killed at Tue Nov 27 17:59:45 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 17:59:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83660 >/dev/null 2>/dev/null
selfserv with PID 83660 found at Tue Nov 27 17:59:45 PST 2012
selfserv with PID 83660 started at Tue Nov 27 17:59:45 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:45 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:59:47 PST 2012
ssl.sh: #7673: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83660 at Tue Nov 27 17:59:47 PST 2012
kill -USR1 83660
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83660 killed at Tue Nov 27 17:59:47 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 17:59:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83718 >/dev/null 2>/dev/null
selfserv with PID 83718 found at Tue Nov 27 17:59:47 PST 2012
selfserv with PID 83718 started at Tue Nov 27 17:59:47 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:47 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:59:48 PST 2012
ssl.sh: #7674: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83718 at Tue Nov 27 17:59:48 PST 2012
kill -USR1 83718
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83718 killed at Tue Nov 27 17:59:48 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 17:59:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83782 >/dev/null 2>/dev/null
selfserv with PID 83782 found at Tue Nov 27 17:59:48 PST 2012
selfserv with PID 83782 started at Tue Nov 27 17:59:48 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:48 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:59:49 PST 2012
ssl.sh: #7675: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83782 at Tue Nov 27 17:59:49 PST 2012
kill -USR1 83782
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83782 killed at Tue Nov 27 17:59:49 PST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:59:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83861 >/dev/null 2>/dev/null
selfserv with PID 83861 found at Tue Nov 27 17:59:49 PST 2012
selfserv with PID 83861 started at Tue Nov 27 17:59:49 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:59:50 PST 2012
ssl.sh: #7676: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83861 at Tue Nov 27 17:59:50 PST 2012
kill -USR1 83861
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83861 killed at Tue Nov 27 17:59:50 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:59:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83919 >/dev/null 2>/dev/null
selfserv with PID 83919 found at Tue Nov 27 17:59:50 PST 2012
selfserv with PID 83919 started at Tue Nov 27 17:59:50 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:59:51 PST 2012
ssl.sh: #7677: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83919 at Tue Nov 27 17:59:51 PST 2012
kill -USR1 83919
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83919 killed at Tue Nov 27 17:59:51 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 17:59:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 83977 >/dev/null 2>/dev/null
selfserv with PID 83977 found at Tue Nov 27 17:59:51 PST 2012
selfserv with PID 83977 started at Tue Nov 27 17:59:51 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 17:59:53 PST 2012
ssl.sh: #7678: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 83977 at Tue Nov 27 17:59:53 PST 2012
kill -USR1 83977
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 83977 killed at Tue Nov 27 17:59:53 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 17:59:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84035 >/dev/null 2>/dev/null
selfserv with PID 84035 found at Tue Nov 27 17:59:53 PST 2012
selfserv with PID 84035 started at Tue Nov 27 17:59:53 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:53 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:59:53 PST 2012
ssl.sh: #7679: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84035 at Tue Nov 27 17:59:53 PST 2012
kill -USR1 84035
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84035 killed at Tue Nov 27 17:59:53 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 17:59:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84093 >/dev/null 2>/dev/null
selfserv with PID 84093 found at Tue Nov 27 17:59:53 PST 2012
selfserv with PID 84093 started at Tue Nov 27 17:59:53 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:53 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:59:54 PST 2012
ssl.sh: #7680: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84093 at Tue Nov 27 17:59:54 PST 2012
kill -USR1 84093
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84093 killed at Tue Nov 27 17:59:54 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:59:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84151 >/dev/null 2>/dev/null
selfserv with PID 84151 found at Tue Nov 27 17:59:54 PST 2012
selfserv with PID 84151 started at Tue Nov 27 17:59:54 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:54 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 17:59:55 PST 2012
ssl.sh: #7681: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84151 at Tue Nov 27 17:59:55 PST 2012
kill -USR1 84151
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84151 killed at Tue Nov 27 17:59:55 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 17:59:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84209 >/dev/null 2>/dev/null
selfserv with PID 84209 found at Tue Nov 27 17:59:55 PST 2012
selfserv with PID 84209 started at Tue Nov 27 17:59:55 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:59:55 PST 2012
ssl.sh: #7682: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84209 at Tue Nov 27 17:59:55 PST 2012
kill -USR1 84209
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84209 killed at Tue Nov 27 17:59:55 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 17:59:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84267 >/dev/null 2>/dev/null
selfserv with PID 84267 found at Tue Nov 27 17:59:55 PST 2012
selfserv with PID 84267 started at Tue Nov 27 17:59:56 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 17:59:56 PST 2012
ssl.sh: #7683: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84267 at Tue Nov 27 17:59:56 PST 2012
kill -USR1 84267
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84267 killed at Tue Nov 27 17:59:56 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 17:59:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84331 >/dev/null 2>/dev/null
selfserv with PID 84331 found at Tue Nov 27 17:59:56 PST 2012
selfserv with PID 84331 started at Tue Nov 27 17:59:56 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 17:59:58 PST 2012
ssl.sh: #7684: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84331 at Tue Nov 27 17:59:58 PST 2012
kill -USR1 84331
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84331 killed at Tue Nov 27 17:59:58 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 17:59:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 17:59:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84395 >/dev/null 2>/dev/null
selfserv with PID 84395 found at Tue Nov 27 17:59:58 PST 2012
selfserv with PID 84395 started at Tue Nov 27 17:59:58 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 17:59:58 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:00:00 PST 2012
ssl.sh: #7685: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84395 at Tue Nov 27 18:00:00 PST 2012
kill -USR1 84395
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84395 killed at Tue Nov 27 18:00:00 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:00:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84474 >/dev/null 2>/dev/null
selfserv with PID 84474 found at Tue Nov 27 18:00:01 PST 2012
selfserv with PID 84474 started at Tue Nov 27 18:00:01 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:03 PST 2012
ssl.sh: #7686: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84474 at Tue Nov 27 18:00:03 PST 2012
kill -USR1 84474
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84474 killed at Tue Nov 27 18:00:03 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:00:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84533 >/dev/null 2>/dev/null
selfserv with PID 84533 found at Tue Nov 27 18:00:03 PST 2012
selfserv with PID 84533 started at Tue Nov 27 18:00:03 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:04 PST 2012
ssl.sh: #7687: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84533 at Tue Nov 27 18:00:04 PST 2012
kill -USR1 84533
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84533 killed at Tue Nov 27 18:00:04 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:00:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84591 >/dev/null 2>/dev/null
selfserv with PID 84591 found at Tue Nov 27 18:00:04 PST 2012
selfserv with PID 84591 started at Tue Nov 27 18:00:04 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:04 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:06 PST 2012
ssl.sh: #7688: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84591 at Tue Nov 27 18:00:07 PST 2012
kill -USR1 84591
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84591 killed at Tue Nov 27 18:00:07 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:00:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84649 >/dev/null 2>/dev/null
selfserv with PID 84649 found at Tue Nov 27 18:00:07 PST 2012
selfserv with PID 84649 started at Tue Nov 27 18:00:07 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:08 PST 2012
ssl.sh: #7689: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84649 at Tue Nov 27 18:00:08 PST 2012
kill -USR1 84649
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84649 killed at Tue Nov 27 18:00:08 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:00:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84707 >/dev/null 2>/dev/null
selfserv with PID 84707 found at Tue Nov 27 18:00:09 PST 2012
selfserv with PID 84707 started at Tue Nov 27 18:00:09 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:09 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:10 PST 2012
ssl.sh: #7690: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84707 at Tue Nov 27 18:00:10 PST 2012
kill -USR1 84707
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84707 killed at Tue Nov 27 18:00:10 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:00:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84765 >/dev/null 2>/dev/null
selfserv with PID 84765 found at Tue Nov 27 18:00:10 PST 2012
selfserv with PID 84765 started at Tue Nov 27 18:00:10 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:00:11 PST 2012
ssl.sh: #7691: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84765 at Tue Nov 27 18:00:11 PST 2012
kill -USR1 84765
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84765 killed at Tue Nov 27 18:00:11 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84844 >/dev/null 2>/dev/null
selfserv with PID 84844 found at Tue Nov 27 18:00:11 PST 2012
selfserv with PID 84844 started at Tue Nov 27 18:00:11 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:11 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:12 PST 2012
ssl.sh: #7692: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84844 at Tue Nov 27 18:00:12 PST 2012
kill -USR1 84844
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84844 killed at Tue Nov 27 18:00:12 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:00:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84902 >/dev/null 2>/dev/null
selfserv with PID 84902 found at Tue Nov 27 18:00:12 PST 2012
selfserv with PID 84902 started at Tue Nov 27 18:00:12 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:12 PST 2012
ssl.sh: #7693: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84902 at Tue Nov 27 18:00:12 PST 2012
kill -USR1 84902
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84902 killed at Tue Nov 27 18:00:12 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 84960 >/dev/null 2>/dev/null
selfserv with PID 84960 found at Tue Nov 27 18:00:13 PST 2012
selfserv with PID 84960 started at Tue Nov 27 18:00:13 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:13 PST 2012
ssl.sh: #7694: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 84960 at Tue Nov 27 18:00:13 PST 2012
kill -USR1 84960
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 84960 killed at Tue Nov 27 18:00:13 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85018 >/dev/null 2>/dev/null
selfserv with PID 85018 found at Tue Nov 27 18:00:13 PST 2012
selfserv with PID 85018 started at Tue Nov 27 18:00:13 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:14 PST 2012
ssl.sh: #7695: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85018 at Tue Nov 27 18:00:14 PST 2012
kill -USR1 85018
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85018 killed at Tue Nov 27 18:00:14 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:00:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85076 >/dev/null 2>/dev/null
selfserv with PID 85076 found at Tue Nov 27 18:00:14 PST 2012
selfserv with PID 85076 started at Tue Nov 27 18:00:14 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:15 PST 2012
ssl.sh: #7696: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85076 at Tue Nov 27 18:00:15 PST 2012
kill -USR1 85076
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85076 killed at Tue Nov 27 18:00:15 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:00:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85134 >/dev/null 2>/dev/null
selfserv with PID 85134 found at Tue Nov 27 18:00:15 PST 2012
selfserv with PID 85134 started at Tue Nov 27 18:00:15 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:00:15 PST 2012
ssl.sh: #7697: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85134 at Tue Nov 27 18:00:15 PST 2012
kill -USR1 85134
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85134 killed at Tue Nov 27 18:00:15 PST 2012
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:00:16 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85268 >/dev/null 2>/dev/null
selfserv with PID 85268 found at Tue Nov 27 18:00:16 PST 2012
selfserv with PID 85268 started at Tue Nov 27 18:00:16 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:16 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:17 PST 2012
ssl.sh: #7698: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85268 at Tue Nov 27 18:00:17 PST 2012
kill -USR1 85268
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85268 killed at Tue Nov 27 18:00:17 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:00:17 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85326 >/dev/null 2>/dev/null
selfserv with PID 85326 found at Tue Nov 27 18:00:17 PST 2012
selfserv with PID 85326 started at Tue Nov 27 18:00:17 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:18 PST 2012
ssl.sh: #7699: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85326 at Tue Nov 27 18:00:18 PST 2012
kill -USR1 85326
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85326 killed at Tue Nov 27 18:00:18 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:00:18 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85384 >/dev/null 2>/dev/null
selfserv with PID 85384 found at Tue Nov 27 18:00:18 PST 2012
selfserv with PID 85384 started at Tue Nov 27 18:00:18 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:18 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:19 PST 2012
ssl.sh: #7700: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85384 at Tue Nov 27 18:00:19 PST 2012
kill -USR1 85384
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85384 killed at Tue Nov 27 18:00:19 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:00:19 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85442 >/dev/null 2>/dev/null
selfserv with PID 85442 found at Tue Nov 27 18:00:19 PST 2012
selfserv with PID 85442 started at Tue Nov 27 18:00:19 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:00:20 PST 2012
ssl.sh: #7701: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85442 at Tue Nov 27 18:00:20 PST 2012
kill -USR1 85442
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85442 killed at Tue Nov 27 18:00:20 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:00:20 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85500 >/dev/null 2>/dev/null
selfserv with PID 85500 found at Tue Nov 27 18:00:20 PST 2012
selfserv with PID 85500 started at Tue Nov 27 18:00:20 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:20 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:21 PST 2012
ssl.sh: #7702: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85500 at Tue Nov 27 18:00:22 PST 2012
kill -USR1 85500
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85500 killed at Tue Nov 27 18:00:22 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:00:22 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85558 >/dev/null 2>/dev/null
selfserv with PID 85558 found at Tue Nov 27 18:00:22 PST 2012
selfserv with PID 85558 started at Tue Nov 27 18:00:22 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:22 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:00:23 PST 2012
ssl.sh: #7703: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85558 at Tue Nov 27 18:00:23 PST 2012
kill -USR1 85558
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85558 killed at Tue Nov 27 18:00:23 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:00:23 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85616 >/dev/null 2>/dev/null
selfserv with PID 85616 found at Tue Nov 27 18:00:23 PST 2012
selfserv with PID 85616 started at Tue Nov 27 18:00:23 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:23 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:00:25 PST 2012
ssl.sh: #7704: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85616 at Tue Nov 27 18:00:25 PST 2012
kill -USR1 85616
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85616 killed at Tue Nov 27 18:00:25 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:25 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85703 >/dev/null 2>/dev/null
selfserv with PID 85703 found at Tue Nov 27 18:00:25 PST 2012
selfserv with PID 85703 started at Tue Nov 27 18:00:25 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:25 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:27 PST 2012
ssl.sh: #7705: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85703 at Tue Nov 27 18:00:27 PST 2012
kill -USR1 85703
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85703 killed at Tue Nov 27 18:00:27 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:27 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85761 >/dev/null 2>/dev/null
selfserv with PID 85761 found at Tue Nov 27 18:00:27 PST 2012
selfserv with PID 85761 started at Tue Nov 27 18:00:27 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:27 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:29 PST 2012
ssl.sh: #7706: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85761 at Tue Nov 27 18:00:29 PST 2012
kill -USR1 85761
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85761 killed at Tue Nov 27 18:00:29 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:00:29 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85819 >/dev/null 2>/dev/null
selfserv with PID 85819 found at Tue Nov 27 18:00:29 PST 2012
selfserv with PID 85819 started at Tue Nov 27 18:00:29 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:00:29 PST 2012
ssl.sh: #7707: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85819 at Tue Nov 27 18:00:29 PST 2012
kill -USR1 85819
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85819 killed at Tue Nov 27 18:00:29 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:00:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85877 >/dev/null 2>/dev/null
selfserv with PID 85877 found at Tue Nov 27 18:00:30 PST 2012
selfserv with PID 85877 started at Tue Nov 27 18:00:30 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:30 PST 2012
ssl.sh: #7708: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85877 at Tue Nov 27 18:00:30 PST 2012
kill -USR1 85877
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85877 killed at Tue Nov 27 18:00:30 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:00:30 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85935 >/dev/null 2>/dev/null
selfserv with PID 85935 found at Tue Nov 27 18:00:30 PST 2012
selfserv with PID 85935 started at Tue Nov 27 18:00:30 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:31 PST 2012
ssl.sh: #7709: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85935 at Tue Nov 27 18:00:31 PST 2012
kill -USR1 85935
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85935 killed at Tue Nov 27 18:00:31 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:00:31 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 85993 >/dev/null 2>/dev/null
selfserv with PID 85993 found at Tue Nov 27 18:00:31 PST 2012
selfserv with PID 85993 started at Tue Nov 27 18:00:31 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:31 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:00:31 PST 2012
ssl.sh: #7710: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 85993 at Tue Nov 27 18:00:31 PST 2012
kill -USR1 85993
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 85993 killed at Tue Nov 27 18:00:31 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:00:31 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86051 >/dev/null 2>/dev/null
selfserv with PID 86051 found at Tue Nov 27 18:00:31 PST 2012
selfserv with PID 86051 started at Tue Nov 27 18:00:32 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:32 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:00:32 PST 2012
ssl.sh: #7711: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86051 at Tue Nov 27 18:00:32 PST 2012
kill -USR1 86051
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86051 killed at Tue Nov 27 18:00:32 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:00:32 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86138 >/dev/null 2>/dev/null
selfserv with PID 86138 found at Tue Nov 27 18:00:32 PST 2012
selfserv with PID 86138 started at Tue Nov 27 18:00:32 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:32 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:35 PST 2012
ssl.sh: #7712: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86138 at Tue Nov 27 18:00:35 PST 2012
kill -USR1 86138
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86138 killed at Tue Nov 27 18:00:35 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:00:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86196 >/dev/null 2>/dev/null
selfserv with PID 86196 found at Tue Nov 27 18:00:36 PST 2012
selfserv with PID 86196 started at Tue Nov 27 18:00:36 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:36 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:37 PST 2012
ssl.sh: #7713: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86196 at Tue Nov 27 18:00:37 PST 2012
kill -USR1 86196
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86196 killed at Tue Nov 27 18:00:37 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:00:37 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86254 >/dev/null 2>/dev/null
selfserv with PID 86254 found at Tue Nov 27 18:00:37 PST 2012
selfserv with PID 86254 started at Tue Nov 27 18:00:37 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:37 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:40 PST 2012
ssl.sh: #7714: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86254 at Tue Nov 27 18:00:40 PST 2012
kill -USR1 86254
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86254 killed at Tue Nov 27 18:00:40 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:00:40 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86312 >/dev/null 2>/dev/null
selfserv with PID 86312 found at Tue Nov 27 18:00:40 PST 2012
selfserv with PID 86312 started at Tue Nov 27 18:00:40 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:40 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:41 PST 2012
ssl.sh: #7715: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86312 at Tue Nov 27 18:00:41 PST 2012
kill -USR1 86312
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86312 killed at Tue Nov 27 18:00:41 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:00:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86370 >/dev/null 2>/dev/null
selfserv with PID 86370 found at Tue Nov 27 18:00:41 PST 2012
selfserv with PID 86370 started at Tue Nov 27 18:00:41 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:41 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:42 PST 2012
ssl.sh: #7716: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86370 at Tue Nov 27 18:00:42 PST 2012
kill -USR1 86370
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86370 killed at Tue Nov 27 18:00:42 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:00:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86428 >/dev/null 2>/dev/null
selfserv with PID 86428 found at Tue Nov 27 18:00:42 PST 2012
selfserv with PID 86428 started at Tue Nov 27 18:00:42 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:42 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:00:44 PST 2012
ssl.sh: #7717: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86428 at Tue Nov 27 18:00:44 PST 2012
kill -USR1 86428
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86428 killed at Tue Nov 27 18:00:44 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86517 >/dev/null 2>/dev/null
selfserv with PID 86517 found at Tue Nov 27 18:00:44 PST 2012
selfserv with PID 86517 started at Tue Nov 27 18:00:44 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:44 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:45 PST 2012
ssl.sh: #7718: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86517 at Tue Nov 27 18:00:45 PST 2012
kill -USR1 86517
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86517 killed at Tue Nov 27 18:00:45 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:00:45 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86575 >/dev/null 2>/dev/null
selfserv with PID 86575 found at Tue Nov 27 18:00:45 PST 2012
selfserv with PID 86575 started at Tue Nov 27 18:00:45 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:45 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:46 PST 2012
ssl.sh: #7719: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86575 at Tue Nov 27 18:00:46 PST 2012
kill -USR1 86575
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86575 killed at Tue Nov 27 18:00:46 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86633 >/dev/null 2>/dev/null
selfserv with PID 86633 found at Tue Nov 27 18:00:46 PST 2012
selfserv with PID 86633 started at Tue Nov 27 18:00:46 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:46 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:47 PST 2012
ssl.sh: #7720: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86633 at Tue Nov 27 18:00:47 PST 2012
kill -USR1 86633
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86633 killed at Tue Nov 27 18:00:47 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:00:47 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86691 >/dev/null 2>/dev/null
selfserv with PID 86691 found at Tue Nov 27 18:00:47 PST 2012
selfserv with PID 86691 started at Tue Nov 27 18:00:47 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:47 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:00:48 PST 2012
ssl.sh: #7721: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86691 at Tue Nov 27 18:00:48 PST 2012
kill -USR1 86691
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86691 killed at Tue Nov 27 18:00:48 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:00:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86749 >/dev/null 2>/dev/null
selfserv with PID 86749 found at Tue Nov 27 18:00:48 PST 2012
selfserv with PID 86749 started at Tue Nov 27 18:00:48 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:48 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:00:48 PST 2012
ssl.sh: #7722: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86749 at Tue Nov 27 18:00:48 PST 2012
kill -USR1 86749
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86749 killed at Tue Nov 27 18:00:48 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:00:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:00:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 86807 >/dev/null 2>/dev/null
selfserv with PID 86807 found at Tue Nov 27 18:00:48 PST 2012
selfserv with PID 86807 started at Tue Nov 27 18:00:48 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:00:48 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:00:49 PST 2012
ssl.sh: #7723: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 86807 at Tue Nov 27 18:00:49 PST 2012
kill -USR1 86807
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 86807 killed at Tue Nov 27 18:00:49 PST 2012
TIMESTAMP ssl END: Tue Nov 27 18:00:49 PST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 18:00:49 PST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/tests.v3.64867 -t Test2 -f ../tests.pw
merge.sh: #7724: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7725: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7726: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7727: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7728: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7729: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:30:48 2012
            Not After : Tue Nov 28 01:30:48 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:25:4b:25:c2:77:6d:b7:c4:7c:50:00:b5:15:5f:12:
                    79:4e:c4:7f:0d:69:37:c7:f9:5a:44:7e:73:fe:bf:62:
                    a6:a1:a0:b7:ad:69:0c:2a:65:cd:89:a9:7c:48:cd:dd:
                    1a:27:cd:2c:84:a3:84:aa:95:e1:be:5c:04:9e:47:55:
                    12:7c:9e:8c:a6:26:ff:5d:67:d1:1d:c9:08:ad:59:0a:
                    b3:aa:32:d8:93:5e:21:c9:32:46:36:cc:6f:51:b7:58:
                    9d:72:16:a9:ca:ba:a5:4b:35:2f:da:ed:67:3a:75:2f:
                    02:8f:ca:a5:6f:c8:1f:69:5a:24:64:6c:95:a8:33:c9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:47:29:69:58:26:4d:f5:ea:31:e2:fa:38:17:52:1f:
        e8:a4:22:77:b5:84:f3:06:f6:01:2c:b4:42:82:1c:af:
        3d:09:aa:cc:fa:84:1b:8a:d2:b9:78:bf:c0:eb:c7:62:
        66:3d:0e:9b:51:50:8f:d8:00:ca:b9:02:ea:7f:85:cc:
        95:93:9f:f1:51:19:01:06:12:8a:1b:5f:ae:55:c3:b5:
        28:68:3c:3e:5c:5c:eb:17:47:8d:a4:9c:6d:1a:b1:34:
        cd:00:98:4f:97:3e:48:8e:7b:db:a0:38:04:39:2f:d9:
        81:6f:36:96:26:5a:55:f5:66:e3:65:09:33:8d:9b:6c
    Fingerprint (MD5):
        CF:EA:46:AD:EB:99:93:F0:32:24:D3:05:5A:F0:56:2E
    Fingerprint (SHA1):
        83:08:55:89:22:5D:C0:2D:00:60:D4:DD:5D:6A:E0:57:39:DB:FF:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #7730: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 01:30:49 2012
            Not After : Tue Nov 28 01:30:49 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:a0:43:5c:2d:ca:21:3b:50:76:82:1b:9c:72:82:1e:
                    26:34:df:27:65:ba:f3:f7:b2:dd:9e:04:3e:07:7f:df:
                    b0:20:ac:6f:b4:57:2a:95:44:59:3a:fc:96:d4:03:1d:
                    4c:01:34:42:79:a8:b4:bf:34:2b:47:43:2b:97:29:28:
                    6a:2c:3f:77:85:9d:5d:07:43:d4:95:f0:5b:f7:89:04:
                    55:ee:8f:d6:3f:5c:8d:23:80:24:49:8e:da:bd:8d:08:
                    df:93:c8:3a:65:d8:7a:d5:6b:bd:b8:9e:ae:84:ac:c3:
                    e1:52:e4:08:81:0d:39:12:40:d5:19:e0:87:56:ee:65
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:00:50:d9:d4:df:5d:d3:21:be:09:2a:8f:e4:45:10:
        6b:bc:c5:cb:62:f2:66:98:ab:fe:51:7b:2c:bb:da:b0:
        e3:37:ca:4e:60:f3:39:57:0b:63:c4:52:4d:03:3d:b7:
        5d:94:db:ce:58:60:f8:52:e1:81:6b:bc:cf:89:64:1c:
        60:2c:d9:8e:f1:f4:cd:0d:0b:27:f3:37:66:51:10:33:
        bb:fe:2d:a2:97:a8:90:9a:48:35:b3:95:0f:0c:d1:9b:
        2e:1a:95:19:15:02:d9:9f:0c:75:57:67:4f:a5:d7:31:
        a3:1f:9e:13:5a:e4:ba:2c:1c:fd:b5:c9:80:fb:c0:2d
    Fingerprint (MD5):
        9A:70:80:84:70:01:10:A3:FB:64:96:6A:74:28:AD:58
    Fingerprint (SHA1):
        77:2D:CE:DE:89:B7:AC:46:E0:90:A4:32:A4:2D:67:3C:12:98:F3:CD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #7731: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7732: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice                                                        u,u,u
Alice-ec                                                     u,u,u
bob@bogus.com                                                ,,   
Dave                                                         u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
Dave-ec                                                      u,u,u
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com                  u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com-ec               u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed      u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed          u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com              u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec           u,u,u
ExtendedSSLUser-ecmixed                                      u,u,u
chain-2-clientCA-ec                                          ,,   
chain-2-clientCA                                             ,,   
clientCA-ec                                                  T,C,C
clientCA                                                     T,C,C
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           u,u,u
serverCA-ec                                                  C,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #1                                                     ,,   
Alice #2                                                     ,,   
Alice #99                                                    ,,   
Alice #3                                                     ,,   
Alice #100                                                   ,,   
Alice #4                                                     ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/tests.v3.64867 -t Test2 -f ../tests.pw
merge.sh: #7733: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/upgradedb/tests.v1.64867 -t Test1 -f ../tests.pw
merge.sh: #7734: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #7735: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #7736: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #7737: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 01:31:02 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 01:29:37 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 01:31:00 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #7738: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Tue Nov 27 18:00:53 PST 2012
merge.sh: Testing with shared library ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 18:00:53 PST 2012
lowhash.sh: Lowhash Tests ===============================
freebl lowhash not supported in this plaform.
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 18:00:53 PST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 18:00:53 PST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #7739: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -f ../tests.pw
cert.sh: #7740: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7741: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7742: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -o root.cert
cert.sh: #7743: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -f ../tests.pw
cert.sh: #7744: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7745: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7746: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -o root.cert
cert.sh: #7747: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7748: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -o root.cert
cert.sh: #7749: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7750: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -o root.cert
cert.sh: #7751: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -f ../tests.pw
cert.sh: #7752: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7753: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7754: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -o root.cert
cert.sh: #7755: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7756: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -o root.cert
cert.sh: #7757: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7758: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -o root.cert
cert.sh: #7759: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7760: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #7761: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7762: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #7763: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7764: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #7765: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7766: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #7767: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7768: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #7769: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7770: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #7771: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #7772: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #7773: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -f ../tests.pw
cert.sh: #7774: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7775: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7776: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com.cert -f ../tests.pw
cert.sh: #7777: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com.cert
cert.sh: #7778: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/clientCA.ca.cert
cert.sh: #7779: Import Client Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7780: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert -f ../tests.pw
cert.sh: #7781: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert
cert.sh: #7782: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/clientCA-ec.ca.cert
cert.sh: #7783: Import Client EC Root CA -t T,, for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7784: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com (ext) - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw
cert.sh: #7785: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Request (ext) - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #7786: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #7787: Import chain-1-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/chain-1-serverCA.ca.cert
cert.sh: #7788: Import chain-1-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #7789: Import chain-2-serverCA-ec CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/chain-2-serverCA.ca.cert
cert.sh: #7790: Import chain-2-serverCA CA -t u,u,u for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/serverCA-ec.ca.cert
cert.sh: #7791: Import serverCA-ec CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_server -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/serverCA.ca.cert
cert.sh: #7792: Import serverCA CA -t C,C,C for nss-vm-darwin9-1.community.scl3.mozilla.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -f ../tests.pw
cert.sh: #7793: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7794: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7795: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #7796: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #7797: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/serverCA.ca.cert
cert.sh: #7798: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7799: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #7800: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #7801: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA/serverCA-ec.ca.cert
cert.sh: #7802: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7803: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #7804: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #7805: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #7806: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/chain-1-clientCA.ca.cert
cert.sh: #7807: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #7808: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/chain-2-clientCA.ca.cert
cert.sh: #7809: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/clientCA-ec.ca.cert
cert.sh: #7810: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ext_client -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/clientCA/clientCA.ca.cert
cert.sh: #7811: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw
cert.sh: #7812: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7813: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -i ../CA/TestCA.ca.cert
cert.sh: #7814: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #7815: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7816: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #7817: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser.cert
cert.sh: #7818: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7819: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #7820: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #7821: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7822: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #7823: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #7824: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             nss-vm-darwin9-1.community.scl3.mozilla.com ------------------------------------
cert.sh: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw
cert.sh: #7825: Initializing nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB - PASSED
cert.sh: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7826: Loading root cert module to nss-vm-darwin9-1.community.scl3.mozilla.com's Cert DB - PASSED
cert.sh: Import Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -i ../CA/TestCA.ca.cert
cert.sh: #7827: Import Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Import EC Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #7828: Import EC Root CA for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7829: Generate Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com.cert -f ../tests.pw 
cert.sh: #7830: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's Request - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com.cert
cert.sh: #7831: Import nss-vm-darwin9-1.community.scl3.mozilla.com's Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's Cert Created
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7832: Generate EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert -f ../tests.pw 
cert.sh: #7833: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ec.cert
cert.sh: #7834: Import nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1.community.scl3.mozilla.com, E=nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7835: Generate mixed EC Cert Request for nss-vm-darwin9-1.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw 
cert.sh: #7836: Sign nss-vm-darwin9-1.community.scl3.mozilla.com's EC Request with RSA - PASSED
cert.sh: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -i nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #7837: Import nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1.community.scl3.mozilla.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             nss-vm-darwin9-1.community.scl3.mozilla.com-sni --------------------------------
cert.sh: Generate Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7838: Generate Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com.cert -f ../tests.pw 
cert.sh: #7839: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Request - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com.cert
cert.sh: #7840: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's Cert Created
cert.sh: Generate EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7841: Generate EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec.cert -f ../tests.pw 
cert.sh: #7842: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec.cert
cert.sh: #7843: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com --------------------------
certutil -s "CN=nss-vm-darwin9-1-sni.community.scl3.mozilla.com, E=nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7844: Generate mixed EC Cert Request for nss-vm-darwin9-1-sni.community.scl3.mozilla.com - PASSED
cert.sh: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed.cert -f ../tests.pw 
cert.sh: #7845: Sign nss-vm-darwin9-1-sni.community.scl3.mozilla.com's EC Request with RSA - PASSED
cert.sh: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert --------------------------
certutil -A -n nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw -i nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed.cert
cert.sh: #7846: Import nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert - PASSED
cert.sh SUCCESS: nss-vm-darwin9-1-sni.community.scl3.mozilla.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw
cert.sh: #7847: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server -f ../tests.pw
cert.sh: #7848: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw
cert.sh: #7849: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7850: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #7851: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #7852: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7853: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #7854: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #7855: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7856: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #7857: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #7858: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7859: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #7860: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #7861: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw
cert.sh: #7862: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7863: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #7864: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #7865: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7866: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #7867: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #7868: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7869: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #7870: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #7871: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7872: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #7873: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #7874: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw
cert.sh: #7875: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7876: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -i ../CA/TestCA.ca.cert
cert.sh: #7877: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #7878: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7879: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #7880: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw -i Dave.cert
cert.sh: #7881: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7882: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #7883: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #7884: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7885: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #7886: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #7887: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw
cert.sh: #7888: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7889: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -i ../CA/TestCA.ca.cert
cert.sh: #7890: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #7891: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7892: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #7893: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw -i Eve.cert
cert.sh: #7894: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7895: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #7896: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #7897: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7898: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #7899: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #7900: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #7901: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #7902: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #7903: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #7904: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #7905: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #7906: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #7907: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #7908: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips -f ../tests.fipspw
cert.sh: #7909: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7910: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #7911: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #7912: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw
cert.sh: #7913: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #7914: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #7915: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7916: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #7917: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #7918: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7919: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #7920: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #7921: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7922: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #7923: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #7924: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7925: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #7926: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #7927: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7928: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #7929: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #7930: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7931: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #7932: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #7933: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7934: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #7935: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #7936: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7937: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #7938: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #7939: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7940: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #7941: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #7942: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7943: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #7944: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #7945: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7946: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #7947: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #7948: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7949: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #7950: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #7951: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7952: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #7953: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #7954: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7955: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #7956: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #7957: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7958: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #7959: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #7960: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7961: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #7962: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #7963: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7964: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #7965: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #7966: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7967: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #7968: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #7969: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7970: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #7971: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #7972: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7973: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #7974: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #7975: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7976: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #7977: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #7978: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7979: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #7980: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #7981: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7982: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #7983: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #7984: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7985: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #7986: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #7987: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7988: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #7989: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #7990: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7991: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #7992: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #7993: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7994: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #7995: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #7996: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #7997: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #7998: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #7999: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8000: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #8001: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #8002: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8003: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #8004: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #8005: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8006: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #8007: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #8008: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8009: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #8010: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #8011: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8012: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #8013: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #8014: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8015: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #8016: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #8017: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8018: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #8019: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #8020: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8021: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #8022: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #8023: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8024: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #8025: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #8026: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8027: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #8028: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #8029: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8030: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #8031: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #8032: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8033: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #8034: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #8035: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8036: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #8037: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #8038: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8039: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #8040: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #8041: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8042: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #8043: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #8044: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8045: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #8046: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #8047: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8048: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #8049: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #8050: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8051: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #8052: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #8053: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8054: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #8055: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #8056: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8057: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #8058: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #8059: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8060: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #8061: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #8062: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8063: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #8064: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #8065: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8066: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #8067: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #8068: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8069: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #8070: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #8071: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8072: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #8073: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #8074: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8075: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #8076: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #8077: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8078: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #8079: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #8080: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8081: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #8082: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #8083: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8084: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #8085: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #8086: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8087: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #8088: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #8089: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8090: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #8091: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #8092: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8093: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #8094: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #8095: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8096: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #8097: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #8098: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8099: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #8100: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #8101: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8102: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #8103: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #8104: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8105: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #8106: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #8107: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8108: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #8109: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #8110: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8111: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #8112: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #8113: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8114: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #8115: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #8116: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8117: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #8118: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #8119: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8120: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #8121: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #8122: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8123: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #8124: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #8125: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw
cert.sh: #8126: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8127: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #8128: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #8129: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8130: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #8131: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #8132: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8133: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #8134: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #8135: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8136: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #8137: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #8138: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:ec
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:35 2012
            Not After : Thu Feb 28 02:02:35 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:b4:bc:93:89:75:50:dd:b0:47:0b:81:09:c7:7c:08:
                    77:ea:ed:35:fd:f2:53:1a:86:8f:54:95:91:c0:15:ae:
                    36:3d:e3:bb:dc:85:48:64:1a:1b:52:df:16:79:39:17:
                    09:95:e4:cc:9c:94:32:a9:29:dc:62:04:80:61:94:0a:
                    8d:84:4b:dd:bc:7c:13:b7:32:64:b3:1c:6d:39:e8:bf:
                    eb:b3:4b:af:0b:ab:02:c5:aa:46:00:bf:2e:07:dd:8f:
                    64:3a:75:9a:60:8f:ed:dc:db:d1:87:41:2f:fe:44:6d:
                    4e:47:64:67:a9:af:0a:75:b7:9d:0e:63:86:19:95:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:22:e8:fc:f3:0f:69:45:66:e4:79:fa:c3:49:bd:49:
        22:29:03:59:f6:84:a6:13:f0:5f:b3:3d:ca:8b:68:91:
        4f:44:be:0e:1b:49:b5:cd:06:ce:11:27:0f:7c:5d:85:
        cb:b1:d9:ab:38:7e:ee:b2:86:de:7c:47:e3:90:fa:cc:
        f0:e3:c0:17:eb:ef:85:3e:70:c6:30:f4:56:75:5c:bf:
        e1:c6:97:aa:9c:94:54:38:54:4b:32:de:de:bc:1f:db:
        fe:2b:31:f4:aa:75:b2:8b:21:ab:01:40:46:02:f8:02:
        44:5d:d6:69:15:2f:0e:6e:d7:07:1c:19:94:92:16:49
    Fingerprint (MD5):
        54:C1:72:8C:E5:DB:FA:F6:A9:A1:B6:59:29:52:A6:B3
    Fingerprint (SHA1):
        11:FA:75:AA:D5:53:1A:A3:85:1F:BB:E6:4C:D2:7B:51:E7:8C:C4:0C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8139: Certificate Key Usage Extension (1) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:ed
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:36 2012
            Not After : Thu Feb 28 02:02:36 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:c2:87:60:32:e9:e7:42:15:43:18:2a:a1:88:35:e2:
                    f6:98:82:72:ad:40:37:d0:ab:11:92:ed:f0:59:01:4b:
                    b7:1f:74:51:84:f8:22:b8:15:38:6b:98:e6:4a:e1:fe:
                    f9:04:fa:27:98:0c:7a:1f:d5:0c:3a:61:af:5e:57:c2:
                    a5:4f:9c:72:06:7d:69:ec:8e:43:29:c4:51:e2:48:c1:
                    16:f6:9f:08:dd:89:db:ca:cd:8d:71:fc:c8:1e:62:76:
                    a8:4b:87:41:ef:9c:cd:f4:ae:24:3f:8b:13:9a:6c:3a:
                    ba:5b:b1:31:d7:d3:58:bd:0d:55:1c:c2:43:9b:0f:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        59:a0:e8:9d:09:58:71:3e:ea:73:bb:dd:17:f0:50:aa:
        29:ee:35:bd:31:72:bd:b6:af:5d:1e:5b:5c:a5:c5:2e:
        fe:d3:6c:88:a4:1c:88:4f:ab:36:ba:e0:26:15:d0:15:
        16:89:85:61:d9:8b:b4:60:c4:51:e2:7d:2d:ea:58:42:
        0a:61:23:b3:72:c5:d3:8e:15:f7:df:fd:93:f1:3b:94:
        2c:00:d4:83:95:c7:5a:82:88:4c:62:33:30:0d:5e:49:
        1e:70:c8:ba:c1:b3:ee:b9:27:b6:53:4d:34:f6:f0:41:
        ce:45:b9:0d:84:8e:a6:ba:30:1e:6d:f4:c1:c1:e0:67
    Fingerprint (MD5):
        13:3E:F3:2A:3F:6C:FF:06:06:19:2C:50:4E:3D:66:DE
    Fingerprint (SHA1):
        F6:31:AA:13:B5:31:9C:A0:6B:1B:5C:17:B4:54:91:E3:02:54:1F:89

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8140: Certificate Key Usage Extension (2) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:ef
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:37 2012
            Not After : Thu Feb 28 02:02:37 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:25:02:06:22:dd:a4:05:fa:f9:65:ae:d5:f1:7d:17:
                    24:a1:77:bd:a8:7a:5c:06:ac:f0:c6:b4:ba:65:ea:a6:
                    69:90:92:78:68:80:0b:f2:98:76:be:7d:74:24:74:29:
                    7a:a8:e5:86:64:9a:22:50:39:86:1a:5f:b4:3e:c7:44:
                    f6:4d:67:5c:19:1a:29:ad:72:09:51:51:a3:a0:08:87:
                    92:03:b8:de:02:bf:61:73:f3:38:89:d2:5c:b4:b5:77:
                    37:55:1b:0c:80:06:47:ea:1c:87:0c:22:95:97:b3:41:
                    75:51:24:35:4b:98:65:cc:df:63:ea:d8:fa:de:5a:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b3:b3:41:a5:03:88:1c:0c:ff:11:7f:42:b5:f0:84:11:
        43:92:c0:ff:26:e7:9b:d0:22:52:c6:5b:c2:e4:bf:26:
        5f:63:53:9f:93:5e:ec:28:bd:3d:18:ab:39:47:78:4c:
        b0:78:59:4f:c6:c3:0c:a6:bd:e7:1d:30:1b:f3:e6:63:
        0e:de:3f:4f:bc:e3:93:f8:2f:58:ac:3b:71:0e:57:0c:
        1e:ab:8e:eb:b8:6b:cc:f0:b1:8f:b2:a6:c3:cb:ce:cf:
        99:46:06:09:b5:a4:27:e3:58:59:04:8c:7a:9d:8e:f3:
        ad:f0:53:36:de:f0:93:c4:d1:6b:28:54:96:f0:6d:f6
    Fingerprint (MD5):
        D0:23:51:68:29:AD:BD:46:E7:24:F3:AC:DD:69:7E:27
    Fingerprint (SHA1):
        9A:B9:4E:B1:99:9B:EC:B2:AD:E2:A1:8C:B6:5D:48:99:78:A1:6F:BB

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8141: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f0
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:37 2012
            Not After : Thu Feb 28 02:02:37 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:e9:ca:dc:3f:ae:88:71:e6:4a:c2:95:89:e4:28:77:
                    11:b2:c0:84:39:b0:48:a9:cf:2e:0f:ca:54:1b:e2:d6:
                    4c:6d:37:a7:6d:86:c5:51:e9:88:d8:49:d0:6c:c7:1a:
                    c9:6d:53:47:ed:fa:c2:e6:3b:32:c5:85:40:e3:8a:f3:
                    fd:d6:e6:6a:57:91:af:cb:cf:04:af:b6:dc:dc:d6:dd:
                    06:d9:0a:91:a2:5f:77:b2:b4:16:69:45:1e:b7:6e:ed:
                    b3:35:76:83:4b:5e:1c:cc:c7:a4:24:67:68:62:3a:7d:
                    2d:21:b4:47:d3:e0:5a:1d:21:65:6d:c9:57:1b:14:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        30:12:c8:f0:f6:76:cd:44:80:d7:3d:33:b4:ef:79:2f:
        25:fe:cb:9c:44:a0:c8:13:82:d1:98:ad:e0:89:ba:5c:
        f8:41:8b:35:7e:de:a7:d0:a8:68:5a:5b:12:32:6a:be:
        1a:b1:6b:34:9a:fb:6a:21:a6:87:48:d0:9c:7d:08:91:
        9a:aa:e4:90:f8:8d:d3:94:97:af:98:81:b8:c3:28:00:
        8e:fb:07:51:bb:da:45:f2:e5:ab:4e:b6:92:13:14:7c:
        be:29:b5:12:8e:40:e0:ae:13:83:06:b2:74:38:6b:45:
        b4:90:15:fb:5b:60:0a:7d:81:e3:05:0a:fb:11:96:0a
    Fingerprint (MD5):
        21:4E:47:8D:A1:19:31:1D:33:79:0E:95:D7:A1:5E:7F
    Fingerprint (SHA1):
        6E:19:87:87:46:AE:5D:86:49:BC:F6:BD:A3:67:31:5B:F1:BB:B7:82

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8142: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f2
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:38 2012
            Not After : Thu Feb 28 02:02:38 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:9d:0b:a9:65:86:7a:ca:b6:65:b1:f2:0f:8e:2e:e3:
                    ae:9d:20:fa:13:65:bc:21:b7:b2:5f:b5:87:9c:7f:5a:
                    8f:56:5d:89:ed:d4:38:22:35:94:89:22:30:3f:8d:51:
                    3c:2c:e0:d0:23:ec:94:d8:7e:89:95:31:63:4e:1c:36:
                    67:17:c8:11:ed:31:de:c0:33:0e:8a:61:7b:6c:3c:54:
                    0a:61:7d:26:de:b1:20:23:02:3e:0c:0d:a3:b1:08:36:
                    e9:b8:42:cd:4f:a7:99:ea:b2:4b:a7:0c:e8:35:fd:cc:
                    16:1e:f5:4d:d9:93:eb:84:ae:c8:07:4c:f2:f2:2d:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c5:ba:a5:65:4a:ef:2a:af:e5:6c:77:97:01:02:0c:79:
        80:90:7f:29:cc:1d:9a:8c:ae:64:57:07:6e:76:13:48:
        05:16:c7:29:94:5d:a3:01:98:d1:7f:07:20:6d:5c:90:
        fd:dd:5e:b4:7d:2c:34:53:55:7a:90:1f:28:b9:0c:54:
        85:32:8b:fd:dd:f0:06:8f:9c:3a:70:d7:4d:33:0d:7a:
        3b:c0:80:24:8b:8e:a3:17:de:bd:3d:67:3b:03:29:a6:
        61:01:6c:f9:22:44:58:cc:1c:1e:07:3b:ae:11:b6:d3:
        27:ff:0e:e9:c2:2c:5b:93:ad:28:64:a6:0a:06:05:a5
    Fingerprint (MD5):
        12:6E:CB:E5:70:1C:38:38:6D:82:A7:84:AB:F6:E8:B1
    Fingerprint (SHA1):
        5C:75:E3:CE:BE:3E:6C:15:64:59:D5:EE:79:32:8A:2E:3C:C7:41:DA

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8143: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f3
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:39 2012
            Not After : Thu Feb 28 02:02:39 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:c2:34:1e:55:80:51:ea:16:ff:f2:e9:75:3e:f8:e2:
                    62:4a:51:c8:9c:55:d2:65:d8:a2:2f:81:b8:6e:60:68:
                    c1:4f:57:b2:5f:32:6d:19:aa:c9:ee:03:52:8f:40:28:
                    13:07:b4:1f:9a:96:f9:8b:fe:91:aa:ea:f8:8c:0b:f4:
                    d1:4c:ad:61:6d:37:d7:b2:73:cb:6c:10:88:62:c2:c0:
                    46:90:0d:dc:5a:31:86:f6:bc:8c:0a:d3:b1:88:97:0c:
                    55:31:d7:b6:1f:26:d4:0d:c5:f7:e0:4d:83:b5:ae:33:
                    d3:f4:0f:a9:55:fd:a0:d9:fe:8b:1c:cc:55:98:b9:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:71:ff:3e:21:b9:85:32:ea:96:82:91:68:de:7c:f3:
        5f:83:a0:ac:6e:45:b6:3b:23:7b:9e:6e:c8:60:14:f8:
        d7:dc:1d:44:e2:9b:a4:8f:bc:e1:a5:03:7a:0a:b2:19:
        e8:38:95:76:c1:2f:34:2c:10:58:10:47:cd:52:04:ea:
        1b:39:08:f3:48:2f:bc:3c:34:29:81:48:fb:24:9a:9c:
        02:34:cc:03:ca:c7:5f:fd:3b:48:1a:72:3d:ec:3c:84:
        e5:66:5f:2b:53:a5:fa:d8:73:52:39:39:ae:d2:49:1b:
        4e:49:d2:37:71:ea:7f:0f:f3:b0:63:fb:a1:ce:37:23
    Fingerprint (MD5):
        18:2C:17:BD:67:8F:B4:8A:0C:56:F5:F4:5E:47:F6:21
    Fingerprint (SHA1):
        49:51:F4:C8:F9:BC:DA:4B:02:9B:13:40:DA:22:70:48:5B:4B:5C:05

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8144: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f5
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:40 2012
            Not After : Thu Feb 28 02:02:40 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:ff:ef:1e:09:97:5a:b2:1c:a8:05:d6:b4:d7:26:e0:
                    36:60:42:59:69:db:ff:37:83:78:ba:e4:dd:bf:fe:03:
                    74:d9:64:d1:f5:b8:cd:5a:da:99:08:6f:6e:dc:7d:b5:
                    19:f6:d6:dc:5c:f6:d4:45:dd:9d:0f:29:1c:9b:f2:5b:
                    7d:60:e3:ea:6e:c9:b6:e4:17:28:c1:79:c1:68:55:48:
                    67:69:9c:4c:18:bc:8a:64:a0:9e:6c:d1:d1:af:4d:00:
                    48:bf:33:01:91:09:35:62:bd:51:a0:cd:78:1e:fd:63:
                    b2:99:a8:22:5a:a9:bb:3f:e5:d7:a2:49:4b:c5:fd:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        57:f2:43:02:43:b1:fd:ca:92:ed:0f:f4:f0:9e:a9:8f:
        75:ee:cb:67:03:09:01:bd:c6:75:5e:f5:ea:84:cc:c5:
        df:0c:5b:2f:6b:d9:e2:01:90:dd:71:1a:c9:e7:40:d6:
        5c:72:0d:2d:68:4b:f1:a9:3f:a4:7b:2b:cc:45:47:cd:
        98:00:61:96:3b:8d:78:75:79:81:b5:39:92:a9:26:86:
        c8:a9:f5:ff:b1:88:83:dc:5f:2d:36:61:2e:8a:ea:bc:
        8f:43:53:74:25:f9:98:d7:a1:97:e1:0b:76:3d:eb:22:
        a0:49:49:17:71:eb:b5:eb:53:c2:e1:da:8f:0e:9d:c0
    Fingerprint (MD5):
        2A:FB:A7:3D:BF:56:05:F3:CA:33:A9:44:FA:07:3B:83
    Fingerprint (SHA1):
        29:B6:39:14:4E:FC:1A:48:9A:BB:A5:C7:80:4C:46:B7:94:E3:BC:2D

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8145: CRL Distribution Points Extension (7) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f6
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:41 2012
            Not After : Thu Feb 28 02:02:41 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:86:1a:87:9b:33:06:b7:62:83:40:f7:8d:56:b9:5f:
                    36:a0:69:87:1a:7c:43:99:df:f3:7b:4f:22:20:f9:db:
                    de:de:fa:d9:b6:e7:df:8f:49:f4:49:71:7b:ca:08:16:
                    17:83:41:ad:bc:6c:aa:05:5f:7f:e4:42:fb:2a:2a:21:
                    48:2c:c2:4b:e1:fb:53:cc:06:04:b9:42:e6:f3:c7:00:
                    d2:da:03:dc:a8:bf:59:7d:ab:cc:3c:3a:02:41:28:70:
                    83:d4:e6:dd:a8:60:f1:e5:ec:55:21:99:91:8c:8b:4a:
                    89:89:37:3e:80:55:26:91:88:b2:f9:d6:be:02:2b:db
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:49:93:23:3e:90:17:18:5c:0e:bf:99:7b:be:48:02:
        56:1c:69:58:de:8f:49:17:26:18:8a:b6:62:c4:38:45:
        50:d8:16:b0:49:2f:34:6a:69:44:0a:75:3e:22:00:d2:
        ec:f1:3c:48:02:8a:5c:dd:f9:2a:fa:46:42:32:60:9d:
        a5:a2:81:b7:78:32:44:a3:a6:c4:6b:3d:03:24:e3:e9:
        04:89:ac:d4:05:ee:f5:c8:80:01:d6:6f:23:af:f7:f6:
        64:c1:8b:bf:4b:7c:93:e6:20:12:13:29:c1:78:40:3a:
        f8:bf:a8:59:4e:80:10:f9:77:78:4a:6f:5c:6c:35:59
    Fingerprint (MD5):
        F4:BC:75:E0:C1:AA:53:A2:2B:3C:9E:B0:90:68:5C:CC
    Fingerprint (SHA1):
        C9:B0:E6:07:F7:65:EF:A9:66:9E:02:E0:DF:7B:3F:2D:9F:C0:94:3C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8146: CRL Distribution Points Extension (8) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f8
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:41 2012
            Not After : Thu Feb 28 02:02:41 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:32:aa:90:f2:d3:7a:8e:9c:32:f4:96:8f:13:80:f0:
                    6c:a8:2d:c1:a5:78:62:1e:1a:3a:96:69:56:bd:e6:a6:
                    02:d5:75:41:c1:49:fb:47:30:5f:fe:24:ff:d1:ff:a7:
                    87:82:00:b8:e2:c9:2f:8d:78:6e:ce:f1:ad:c9:44:16:
                    d1:b8:46:f5:4a:59:ab:41:b2:8c:de:fb:4c:35:53:20:
                    15:3b:52:c7:96:5e:10:9d:41:ca:5a:23:3e:7d:61:eb:
                    77:5a:56:8f:68:a0:8a:74:a5:55:96:a4:1e:b0:68:ad:
                    ef:e6:7f:82:de:1b:be:69:41:9a:84:0b:3c:8f:36:ed
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:6c:18:03:8c:76:14:7f:80:2a:b7:80:95:b9:92:bb:
        83:f4:8b:00:36:c8:d1:f1:16:e5:bd:89:86:1f:3e:45:
        3a:a0:12:2a:63:b8:cd:fa:2f:37:a5:33:b7:65:cf:2c:
        30:36:c3:7b:5a:05:75:1c:5e:fb:a0:9d:b1:5d:7a:a7:
        fc:55:0a:ce:f2:61:6b:69:fb:ef:c7:59:af:c5:bb:43:
        05:89:96:91:7a:fa:76:6d:25:d2:28:43:67:78:89:b9:
        48:6f:45:4f:a7:3f:8e:53:ec:27:38:63:74:1b:4d:74:
        75:dd:e8:5f:7e:62:11:35:6e:c3:97:f4:ae:52:7b:a9
    Fingerprint (MD5):
        7C:68:0F:19:28:2B:04:4C:6A:63:A1:7D:E1:EA:EE:5C
    Fingerprint (SHA1):
        F4:4E:E6:A3:C2:8E:8A:BF:31:24:D5:12:D0:4A:AA:D4:45:37:11:8B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8147: Certificate Type Extension (9) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:f9
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:42 2012
            Not After : Thu Feb 28 02:02:42 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:ec:01:6c:6f:e2:d7:06:7e:98:81:7f:e2:7e:60:8f:
                    44:e7:33:4d:3a:72:4d:d3:62:4a:c4:d9:4c:c9:ea:b7:
                    42:6d:bb:bf:a9:c4:ec:a5:da:50:d0:da:48:dc:75:d1:
                    d0:9a:94:95:3a:6d:fc:90:3e:9c:d5:e9:68:e0:6f:d3:
                    02:35:a1:d9:ef:a2:60:7f:a4:8d:83:6e:e0:c1:09:ec:
                    32:f5:89:a3:50:69:4d:72:05:60:ab:7a:38:09:60:48:
                    41:ce:47:e3:50:81:28:66:f8:61:c4:53:f8:d0:d8:95:
                    17:ba:76:42:ea:2e:78:70:f8:0e:42:3b:b4:e9:bb:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9c:3f:6a:33:c8:f9:8d:9f:20:07:02:de:b4:6e:ff:e9:
        97:b8:fc:0c:6a:3f:52:6d:b9:2e:6e:e9:b8:8f:63:87:
        41:93:7b:c5:42:9b:84:71:1c:e7:b4:04:13:cc:27:bd:
        c4:f6:82:1c:94:a7:1b:19:03:a2:17:df:08:c4:f6:cd:
        c8:f3:e5:6c:74:70:ae:b3:ac:93:9e:ec:b5:f0:38:a0:
        17:24:2c:62:19:11:da:a2:6a:83:75:38:21:ef:98:14:
        3d:10:77:c1:0f:ec:28:52:22:bd:4b:7c:43:01:f3:60:
        87:6b:5e:97:ba:4f:3d:86:8d:62:27:a4:0a:53:c7:63
    Fingerprint (MD5):
        78:BB:1B:0A:8D:52:CE:CB:BD:28:B4:A2:4E:39:89:97
    Fingerprint (SHA1):
        2C:18:B7:FA:58:A9:9A:5C:07:8C:50:AA:1B:C0:74:A3:DD:5F:DE:99

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8148: Extended Key Usage Extension (10) - PASSED

certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:91:fb
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 02:02:43 2012
            Not After : Thu Feb 28 02:02:43 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:4f:cb:0e:34:b1:1b:a8:12:a5:84:c3:b9:36:75:e3:
                    79:e8:09:8b:40:c0:67:7d:ed:5e:3a:db:86:5f:c0:80:
                    fc:a6:cc:ea:f0:3f:e6:dd:55:87:e2:61:f2:2a:d1:a8:
                    93:35:80:a7:99:2f:5f:46:a9:14:fb:7f:25:1b:38:e2:
                    e5:33:48:fb:f0:a8:d6:de:12:6d:1c:1a:8d:91:ca:06:
                    e6:30:d1:16:f7:3b:e6:83:de:be:8f:ab:4a:e3:46:89:
                    81:c2:ca:01:8b:44:13:dc:a8:23:01:f2:ce:f2:db:71:
                    78:c8:84:17:95:a0:a5:33:c6:7c:75:7e:b9:0a:e4:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        97:fc:7b:93:61:09:b7:c0:e1:29:e1:9d:d3:30:67:96:
        03:91:e8:b8:7f:61:f4:16:84:9a:72:11:29:ae:f0:c6:
        b6:2e:44:4f:5b:a5:26:53:34:cd:bd:d9:b8:2a:a9:2a:
        13:8e:20:f4:dd:40:b6:59:26:cf:c2:55:7f:92:ad:6c:
        b1:40:9f:89:54:18:a2:fe:83:29:06:10:a5:01:49:ad:
        ca:b2:2d:51:46:ae:8d:04:1f:b4:f5:ee:bd:7c:b9:af:
        e7:5e:40:3d:89:54:2a:39:63:06:b0:79:99:ce:53:fb:
        5e:29:22:fc:dc:64:f7:34:e1:24:52:93:01:5c:74:f3
    Fingerprint (MD5):
        ED:FC:AD:61:F9:8F:1D:59:18:3D:6E:CC:FE:4E:84:20
    Fingerprint (SHA1):
        63:6C:0D:D7:9A:0D:E0:0F:72:F1:2E:39:FF:9B:4D:38:7A:B6:B2:2E

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8149: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass -f ../tests.pw
cert.sh: #8150: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8151: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8152: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass -o root.cert
cert.sh: #8153: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #8154: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #8155: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #8156: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
cert.sh: #8157: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib -dbdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8158: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -i ../CA/TestCA.ca.cert
cert.sh: #8159: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #8160: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8161: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #8162: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #8163: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8164: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #8165: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #8166: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8167: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #8168: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #8169: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
cert.sh: #8170: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8171: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -o root.cert
cert.sh: #8172: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #8173: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8174: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA/req and ./req are identical (not copied).
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #8175: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #8176: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8177: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8178: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8179: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8180: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8181: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8182: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8183: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8184: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8185: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8186: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8187: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8188: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #8189: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8190: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #8191: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser40.cert
cert.sh: #8192: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8193: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #8194: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #8195: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8196: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #8197: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #8198: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8199: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #8200: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser41.cert
cert.sh: #8201: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8202: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #8203: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #8204: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8205: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #8206: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #8207: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8208: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #8209: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser42.cert
cert.sh: #8210: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8211: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #8212: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #8213: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8214: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #8215: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #8216: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8217: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #8218: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser43.cert
cert.sh: #8219: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8220: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #8221: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #8222: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8223: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #8224: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #8225: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8226: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #8227: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser44.cert
cert.sh: #8228: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8229: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #8230: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #8231: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8232: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #8233: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #8234: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8235: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #8236: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser45.cert
cert.sh: #8237: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8238: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #8239: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #8240: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8241: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #8242: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #8243: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8244: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #8245: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser46.cert
cert.sh: #8246: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8247: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #8248: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #8249: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8250: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #8251: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #8252: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8253: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #8254: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser47.cert
cert.sh: #8255: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8256: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #8257: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #8258: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8259: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #8260: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #8261: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8262: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #8263: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser48.cert
cert.sh: #8264: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8265: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #8266: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #8267: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8268: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #8269: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #8270: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8271: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #8272: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser49.cert
cert.sh: #8273: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8274: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #8275: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #8276: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8277: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #8278: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #8279: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8280: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #8281: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser50.cert
cert.sh: #8282: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8283: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #8284: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #8285: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8286: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #8287: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #8288: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8289: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #8290: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser51.cert
cert.sh: #8291: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8292: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #8293: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #8294: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8295: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #8296: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #8297: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8298: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #8299: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser52.cert
cert.sh: #8300: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8301: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #8302: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #8303: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8304: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #8305: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #8306: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #8307: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #8308: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #8309: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #8310: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #8311: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #8312: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #8313: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #8314: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #8315: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #8316: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #8317: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #8318: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #8319: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #8320: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 18:03:35 PST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Tue Nov 27 18:03:35 PST 2012
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: security library: bad database.
dbtests.sh: #8321: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: security library: bad database.
dbtests.sh: #8322: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #8323: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: security library: bad database.
dbtests.sh: #8324: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir

database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/key3.db" does not exist.
dbtest: function failed: security library: bad database.
dbtests.sh: #8325: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir

dbtests.sh: #8326: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir

dbtests.sh: #8327: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": Unrecognized Object Identifier.
dbtests.sh: #8328: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir

database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/emptydir/key3.db" does not exist.
dbtests.sh: #8329: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir

ERROR: Directory "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key3.db" does not exist.
dbtest: function failed: security library: invalid arguments.
dbtests.sh: #8330: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": Unrecognized Object Identifier.
dbtests.sh: #8331: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir

database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key3.db" does not exist.
dbtests.sh: #8332: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir

ERROR: Directory "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir" is not writeable.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/secmod.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert8.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key3.db
ERROR: File "/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key3.db" does not exist.
dbtests.sh: #8333: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir
---------------------------------------------------------------
dr-xr-xr-x  9 tinderbox  staff    306 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir
-r--r-----  1 tinderbox  staff    578 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/TestUser-ec.cert
-r--r-----  1 tinderbox  staff    576 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/TestUser-ecmixed.cert
-r--r-----  1 tinderbox  staff    609 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/TestUser.cert
-r--------  1 tinderbox  staff  95232 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/cert9.db
-r--------  1 tinderbox  staff  58368 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/key4.db
-r--------  1 tinderbox  staff    730 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/pkcs11.txt
-r--r-----  1 tinderbox  staff    393 Nov 27 18:03 /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/ronlydir/req

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #8334: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:27 2012
            Not After : Tue Nov 28 02:01:27 2017
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:1c:b1:b0:72:c4:9c:93:b1:ea:0f:3e:f9:3f:dc:f4:
                    5e:a5:99:de:2c:29:cf:e3:4d:02:a0:a5:6e:d2:e5:b2:
                    1e:b1:77:72:9d:d6:f9:13:49:06:5d:3a:bb:8e:eb:7d:
                    1b:d0:ae:ab:e1:ce:5c:e6:73:4e:58:7a:93:00:ca:79:
                    27:b6:b1:40:dd:5f:2f:95:04:fa:fe:6c:9b:5f:74:1c:
                    35:48:3a:de:70:65:35:06:81:33:9e:70:02:cc:c9:75:
                    96:c1:dd:2d:61:f1:bd:1a:ff:9e:a5:2d:a2:7c:42:7b:
                    b9:98:74:d9:c6:6a:13:d0:1f:f7:5a:3a:f7:de:6c:17
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8b:54:cb:08:a4:3b:4e:3b:bd:be:31:0e:73:f5:b2:2e:
        9e:f6:15:62:b1:b3:65:df:04:ba:fb:0b:74:3f:22:ab:
        a3:5b:e4:a7:94:ad:6e:9d:af:04:18:94:b0:c3:1b:ca:
        eb:c6:75:65:bb:23:bb:66:34:d4:bd:66:32:bb:a0:2a:
        ad:cb:e6:79:cc:0d:c0:46:9c:46:f8:ac:77:3a:76:d3:
        d0:90:ff:71:78:fe:96:fd:3d:a1:a7:ef:c3:f4:93:42:
        2c:7a:2b:01:e5:e9:c7:84:33:fc:9f:59:4f:b8:7a:d2:
        62:1e:a9:35:11:f5:e4:43:7a:10:88:c7:18:66:6f:bb
    Fingerprint (MD5):
        5E:62:9B:D2:41:41:DE:75:A2:48:C2:FF:68:77:87:46
    Fingerprint (SHA1):
        13:88:82:2C:AF:E6:EC:39:2F:EC:E8:0A:B3:DF:C9:70:22:C6:0D:61

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #8335: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Tue Nov 27 18:03:38 PST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 18:03:38 PST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8336: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b3:fb:67:9e:05:64:1c:e1:b9:06:41:4f:f1:80:2a:39
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8337: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8338: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8339: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8340: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1a:a9:ea:dd:25:c2:2a:d0:23:4c:b1:b9:cf:c1:ee:ec
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 02:01:00 2012
            Not After : Tue Nov 28 02:01:00 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:7a:d0:1c:d2:01:09:d8:af:5d:c2:3d:2e:24:af:
                    cc:70:6c:dc:12:94:1b:5a:4b:1a:3d:10:a0:5e:4f:91:
                    70:2b:a3:ef:ec:90:ab:3e:37:da:29:3e:a0:bd:73:cc:
                    0f:ff:16:94:1a:73:5f:1b:fc:41:1b:c6:83:32:11:a5:
                    e5:50:cd:00:0b:41:d1:a5:d2:20:08:6e:f8:b3:1d:23:
                    4f:aa:57:3a:75:c3:0b:13:f1:99:68:0d:c7:01:0d:2d:
                    fd:60:ca:ea:44:e1:e1:48:5d:17:68:24:37:b7:0d:31:
                    64:86:cc:6a:42:63:55:c9:b1:60:c6:50:36:e0:3f:90:
                    7c:32:9b:cc:4d
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:00:f1:4c:d1:7b:22:51:cf:1a:ee:97:
        58:ba:55:d1:73:f4:88:69:1a:32:06:19:13:36:43:04:
        c6:7c:15:a8:de:c9:d1:d5:c6:00:87:1e:7e:17:d1:8e:
        17:ab:a1:ae:5a:68:21:a5:f3:20:bc:42:63:cb:ec:aa:
        ff:b1:4a:46:77:b2:7b:02:41:45:3f:ab:0f:b1:b3:e5:
        d0:21:3d:09:b3:e5:74:b4:48:fd:89:e0:ef:cc:83:ed:
        6c:0e:7d:65:5b:49:59:e2:6b:0a:b9:b1:a7:01:be:2b:
        1e:b3:23:3f:dd:41:cd:d8:50:14:01:20:4f:ff:fa:bb:
        df:3e:41:8f:8a:f7:8d:b9:b9:08
    Fingerprint (MD5):
        FE:36:AD:86:50:35:B5:1D:1B:BA:01:A8:4F:E4:D3:0B
    Fingerprint (SHA1):
        B2:0E:0A:C7:24:BC:BF:4F:5A:75:E4:68:FD:01:F0:37:45:88:C4:BE

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 02:01:24 2012
            Not After : Tue Nov 28 02:01:24 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:d6:72:56:bb:64:37:4e:ab:4d:41:b9:34:bc:40:fd:
                    d4:61:3a:87:5c:67:76:19:50:12:2c:04:14:9b:69:b3:
                    2d:0b:cd:05:06:8d:80:16:e9:b9:89:c4:50:42:f2:4b:
                    49:9b:cb:23:9b:7f:5a:79:44:9a:68:13:40:0a:1c:27:
                    c9:37:c6:e0:27:34:11:57:3c:41:74:45:f2:b2:f7:d8:
                    ff:70:32:1c:c8:2f:43:04:f3:27:0b:b7:93:1c:09:98:
                    fe
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:01:a6:ab:48:19:a2:f4:eb:21:ae:fc:
        df:1c:96:db:7d:82:13:56:65:2d:cf:31:61:16:93:40:
        7d:b2:53:9c:c2:ed:17:de:b5:a0:22:e1:ba:e8:b1:c1:
        c5:1f:4b:38:5f:53:b4:0b:87:ef:fa:8f:e7:df:71:1a:
        ba:0d:7d:02:7c:08:2b:02:41:68:50:0e:be:6f:de:19:
        88:d3:4a:a9:b8:31:67:96:db:34:e2:81:07:18:1a:bc:
        f0:a0:66:79:97:04:3f:40:f7:c2:e7:99:31:d0:54:a5:
        5c:7a:fa:85:63:f5:78:87:11:ba:f3:c8:16:fd:a9:08:
        2a:ce:3e:f4:24:5e:2a:0d:e0:e2
    Fingerprint (MD5):
        1D:DA:0E:D6:D5:11:52:21:0B:3C:9C:2F:D9:E9:02:90
    Fingerprint (SHA1):
        00:1D:29:3A:EF:34:4A:76:AA:28:C5:77:34:2E:C8:50:B7:91:35:FE

    Friendly Name: Alice-ec

tools.sh: #8341: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8342: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                60:c7:61:e5:38:cd:8c:49:58:db:41:88:2e:05:d3:3e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8343: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8344: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8345: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                91:f3:00:17:5b:61:a3:70:8d:40:47:f5:96:49:d8:8f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8346: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8347: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8348: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                c7:69:1e:6b:8f:a6:cb:8a:98:8a:10:38:ce:cb:a9:83
            Iteration Count: 2000 (0x7d0)
tools.sh: #8349: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8350: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8351: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c2:a9:a7:f6:55:ff:6a:4c:2e:3e:02:bd:05:e3:cc:1b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8352: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8353: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8354: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                4f:4b:76:b1:82:0c:f2:a0:d2:bb:9d:f0:fe:d7:b9:a5
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8355: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8356: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8357: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b3:48:70:ca:92:d5:b7:09:b0:bf:8d:72:c6:81:c6:cc
            Iteration Count: 2000 (0x7d0)
tools.sh: #8358: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8359: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8360: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        75:2b:ca:a5:e4:33:bb:c6:47:2d:2b:13:e0:b1:10:f6
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:6c:e5:37:a4:b9:d1:60:59:f6:5e:4c:0d:cd:f4:
                    ee:d7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8361: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8362: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8363: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        4d:e6:de:6b:29:75:c2:84:73:30:33:0b:1e:df:71:a1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:9e:06:1f:60:5b:fb:37:69:3f:79:fc:0a:2d:83:
                    67:24
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8364: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8365: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8366: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        11:df:3c:4b:ad:66:6e:5b:26:6a:6b:de:87:3d:07:4b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:af:b5:d1:79:68:83:71:48:61:8e:d0:33:72:a0:
                    b7:55
tools.sh: #8367: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8368: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8369: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b8:67:fa:8f:30:cf:00:8e:c9:40:15:01:39:1f:49:53
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:ec:3c:7d:68:8a:60:77:5b:1e:a7:c5:15:10:b8:
                    5d:ba
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8370: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8371: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8372: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d6:32:52:a6:4d:ca:e8:53:c7:b0:e7:9b:23:e2:c9:77
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:41:8a:9d:52:b9:0c:3e:b5:d8:0f:23:5c:be:9a:
                    2b:a3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8373: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8374: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8375: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e9:74:10:aa:f1:d0:45:8b:14:b9:46:3c:80:32:cf:ac
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:58:e1:c3:a9:56:78:d7:15:dc:86:8a:db:f9:a4:
                    21:46
tools.sh: #8376: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8377: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8378: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f6:66:15:1c:da:f2:53:cd:1f:5a:76:53:75:8b:37:9f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:df:80:0b:ba:d3:d3:4f:cd:65:d7:1b:75:da:fd:
                    f1:da
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8379: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8380: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8381: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        57:1b:33:b3:05:af:b1:cf:c7:13:81:ce:fe:13:4d:e3
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:40:35:ec:e1:95:03:bd:5f:b3:43:06:89:cf:0d:
                    aa:aa
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8382: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8383: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8384: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        95:4f:d2:1a:68:5c:8e:14:c6:de:29:ae:a7:88:e3:02
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:f3:a3:17:71:54:3f:d4:02:fc:34:06:ac:46:93:
                    59:36
tools.sh: #8385: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8386: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8387: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        c3:2c:93:47:08:dc:d3:80:9f:7d:36:61:d5:d7:a6:fe
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:6c:e4:a4:ec:58:6c:59:d5:46:03:4f:90:75:8e:
                    30:24
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8388: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8389: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8390: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        37:b1:75:7a:35:33:d4:1d:32:e8:d5:89:e3:79:09:ed
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:61:ed:b1:ee:bd:ff:3e:83:d9:37:70:29:f4:6b:
                    6c:e5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8391: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8392: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8393: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ad:11:75:7c:86:9b:e6:f9:25:50:a2:84:89:0e:6d:ae
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:80:ba:de:f6:d6:af:0b:22:f4:9b:9f:f8:bf:f7:
                    53:30
tools.sh: #8394: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8395: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8396: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5f:fe:2d:e2:64:7d:c9:c6:96:88:ce:e1:d4:5a:d2:f7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:f1:7d:c3:a7:ef:a1:89:0f:63:a6:5e:e7:f5:a0:
                    0e:a0
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8397: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8398: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8399: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a5:4d:a8:10:10:8c:fb:19:bf:e0:65:fb:bc:ed:2e:7a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:3d:2a:dd:4d:80:27:cf:9a:b7:c6:b1:be:f2:18:
                    c4:ec
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8400: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8401: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8402: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        20:2f:cf:5f:70:ca:27:54:09:1c:f5:a1:73:e3:31:27
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:ae:77:fa:52:ac:4c:14:d6:2a:d8:01:94:70:17:
                    b2:4f
tools.sh: #8403: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8404: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8405: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2e:c7:5b:84:33:34:11:ee:be:22:6a:58:4e:5c:22:57
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:3e:57:0b:91:ea:78:a5:45:d4:30:2d:e8:4b:90:
                    6c:42
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8406: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8407: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8408: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e3:21:1c:4e:bc:20:1a:29:14:e4:fb:10:53:b9:ef:1d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:fb:98:ba:d2:95:bb:94:c0:3c:7c:a4:82:d5:f5:
                    21:c5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8409: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8410: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8411: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b9:79:94:2d:83:19:ee:be:3a:f6:8d:e8:8e:34:ac:13
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:e1:3b:75:0a:1d:19:e3:de:11:6f:46:ca:0c:53:
                    2a:81
tools.sh: #8412: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8413: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8414: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                de:fd:3a:fd:d0:b8:b4:1b:9c:8b:dd:ae:37:2b:1e:dc
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8415: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8416: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8417: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                46:71:81:52:db:26:c1:77:7a:5b:1f:44:cd:48:d6:1a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8418: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8419: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8420: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                66:aa:20:c3:9d:d1:ee:94:22:50:9f:e7:8c:c2:4f:be
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8421: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8422: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8423: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                0f:88:e5:95:67:84:f8:1d:d3:31:53:90:69:e6:56:e6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8424: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8425: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8426: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                4c:4a:c1:07:17:85:6a:4f:33:0d:28:bf:9a:f0:a3:f6
            Iteration Count: 2000 (0x7d0)
tools.sh: #8427: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8428: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8429: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                96:e8:c0:0d:50:da:34:3d:f7:49:7e:81:29:8c:cb:eb
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8430: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8431: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8432: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                49:ca:af:37:3b:d3:09:a2:b5:0b:d9:a3:25:05:97:7f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8433: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8434: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8435: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                71:c0:0e:0e:26:1a:4f:2d:4a:24:f6:65:73:29:f1:25
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8436: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8437: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8438: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                52:94:47:86:bf:1f:f7:cb:8a:9c:0d:b0:7f:46:29:f0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8439: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8440: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8441: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                4f:5a:90:3f:12:57:9c:0a:dd:67:79:f7:42:f0:11:06
            Iteration Count: 2000 (0x7d0)
tools.sh: #8442: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8443: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8444: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                e1:74:0b:6c:d1:3c:67:c6:ef:10:14:f6:b1:e5:9f:a8
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8445: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8446: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8447: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                72:46:c0:6f:56:01:49:ac:ec:79:64:a2:65:7f:08:34
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8448: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8449: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8450: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                6f:72:5f:c6:31:fc:ca:78:94:00:ff:1c:f6:61:e8:dd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8451: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8452: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8453: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                55:6d:8c:ab:cf:cd:0e:a4:d4:15:03:10:e3:17:3a:35
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8454: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8455: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8456: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                f7:12:0c:8e:59:91:c9:72:98:27:61:f6:26:39:a0:1b
            Iteration Count: 2000 (0x7d0)
tools.sh: #8457: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8458: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8459: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c6:a0:41:e0:52:2f:a8:b0:38:9e:e5:5c:ce:d0:68:ea
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8460: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8461: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8462: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b9:6d:f5:8f:f6:8c:ef:e0:be:3d:92:78:0e:42:69:e2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8463: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8464: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8465: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                fa:d7:b9:fc:70:70:95:c7:5c:ef:15:ea:ea:5a:e5:7f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8466: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8467: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8468: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                94:c8:e2:45:57:59:3d:ed:bc:eb:d8:0c:e5:ef:4e:7b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8469: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8470: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8471: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b1:05:14:58:f7:db:73:62:8a:a8:07:20:59:a9:e0:0a
            Iteration Count: 2000 (0x7d0)
tools.sh: #8472: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8473: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8474: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3e:28:7c:5c:29:44:2b:8f:5d:19:47:b0:20:75:4d:97
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8475: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8476: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8477: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c8:0e:6c:66:7b:9b:16:39:fb:55:b8:79:55:fa:cb:1f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8478: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8479: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8480: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ce:d4:4e:2b:9a:1f:e9:ae:64:f3:1d:48:d7:88:ec:70
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8481: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8482: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8483: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a6:ce:0a:67:cc:03:6f:27:9e:36:cc:ce:fe:8b:4b:92
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8484: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8485: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8486: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8d:b9:bb:0d:78:7b:08:7e:64:95:ad:08:23:cc:e0:10
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8487: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8488: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8489: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                11:6c:fc:09:fd:d1:7b:be:89:2f:1e:9a:4a:c2:5b:66
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8490: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8491: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8492: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                68:21:0d:fc:61:df:98:af:d1:3d:10:aa:d6:1c:bc:d6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8493: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8494: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8495: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                17:e8:03:0f:a3:cc:74:f2:b4:29:24:09:4a:8b:f8:9a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8496: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8497: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8498: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8c:6c:a4:f0:6c:c9:7d:a8:bb:60:16:8b:c0:ce:fc:c2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8499: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8500: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8501: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                91:36:f5:d3:07:b8:d1:72:7c:89:48:79:5b:fe:b2:a6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:00:54 2012
            Not After : Tue Nov 28 02:00:54 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:92:00:e9:48:a3:7a:48:89:a1:57:63:b5:1a:9e:fc:
                    c1:93:07:95:9f:78:86:21:b1:10:1f:7f:78:e8:b7:ad:
                    54:b8:b9:0e:0d:0d:2e:d7:83:38:73:05:76:4d:a0:f9:
                    55:4c:e2:31:a0:bf:e6:96:2f:92:dd:af:e9:46:10:2b:
                    8b:74:98:68:5f:90:6e:c9:88:82:df:70:ff:6b:d1:6d:
                    d4:ff:41:9f:33:f8:a9:94:67:92:34:d0:04:3a:b9:5d:
                    60:1d:c3:43:4b:5a:76:9d:1a:32:1a:e4:ac:e4:ff:24:
                    ef:05:5c:c8:1a:cc:8e:21:4d:4c:f4:c9:18:7f:08:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:44:ec:fe:5a:b4:53:90:f9:39:be:a3:d0:8e:15:44:
        86:ad:6e:e9:96:ba:5d:73:55:3c:36:16:7e:77:76:bc:
        11:36:71:a9:77:cf:24:82:f8:63:3a:ca:c4:03:2f:2e:
        11:eb:2f:89:1e:59:2e:29:7b:6f:04:63:21:5f:a3:2a:
        8a:19:27:c7:94:83:09:2e:ff:3f:32:b5:23:82:75:c6:
        84:e8:21:a6:c6:58:66:f3:ac:e9:9c:9e:19:51:0c:d8:
        bd:22:27:55:09:21:aa:52:a3:a5:3e:db:5d:a6:f2:f4:
        14:97:f5:73:5a:d1:0d:e5:e9:df:bc:df:a5:1d:06:54
    Fingerprint (MD5):
        A5:AA:F0:FE:4E:2C:C6:2A:50:CE:3D:28:FD:A0:38:5B
    Fingerprint (SHA1):
        0E:F5:14:71:DF:A3:7B:25:0C:F0:18:9B:A9:E7:6D:D3:7E:12:73:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:01:23 2012
            Not After : Tue Nov 28 02:01:23 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:a1:1b:7f:93:88:e8:15:45:6f:95:17:fd:f0:34:c6:
                    5e:c1:ab:2e:fb:a3:48:56:09:95:75:1c:46:45:70:39:
                    03:75:f1:4c:e4:36:fb:45:8d:64:51:a1:a9:93:63:97:
                    ed:5b:e1:67:6c:22:ff:9e:1a:7e:d5:99:cd:30:d5:bd:
                    bc:3a:0d:be:2c:cd:fa:97:5e:24:a7:36:bb:26:9f:3b:
                    ce:cb:4e:12:94:bd:3c:1f:a9:aa:09:7b:e4:96:0e:33:
                    f6:3f:ae:74:d2:f2:8e:aa:67:e3:aa:86:de:39:d3:26:
                    9b:74:73:3c:7a:c6:9a:58:73:c0:d2:81:24:3f:19:9b
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:2b:ed:5b:b5:b5:22:f1:3f:dc:bf:5f:57:66:18:41:
        33:60:8b:26:b0:01:36:a1:39:a9:3e:ef:fc:88:6e:2a:
        fb:b7:ce:1e:1b:d5:59:b9:48:06:32:41:35:52:d3:fc:
        8b:5b:fc:b1:16:27:30:e8:17:0e:9b:ae:95:c9:eb:58:
        8a:3e:f4:11:8a:cc:94:f8:bc:21:67:b4:72:23:24:17:
        50:e0:24:0a:63:ae:a4:c6:14:a3:c6:98:6f:1c:50:61:
        8d:60:82:11:31:b3:c7:bb:ec:f7:5d:7e:7a:7d:a5:3f:
        11:83:41:ef:77:c2:64:29:d8:47:29:bb:84:9a:de:b2
    Fingerprint (MD5):
        B0:2D:52:86:65:5B:8E:69:F6:BA:63:5C:65:2D:AA:05
    Fingerprint (SHA1):
        E0:A2:CA:A7:3F:C2:E3:92:63:99:95:C5:A4:FE:D2:08:E2:C3:FF:A0

    Friendly Name: Alice

tools.sh: #8502: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8503: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #8504: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8505: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #8506: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #8507: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #8508: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #8509: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #8510: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #8511: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #8512: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 18:04:10 PST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 18:04:10 PST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #8513: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #8514: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      ccd9cd96e43a4764d8c59e33c3ba4fd8524c0e0e   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #8515: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #8516: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #8517: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #8518: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #8519: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #8520: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #8521: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #8522: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #8523: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #8524: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #8525: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      ccd9cd96e43a4764d8c59e33c3ba4fd8524c0e0e   FIPS_PUB_140_Test_Certificate
fips.sh: #8526: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #8527: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #8528: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #8529: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #8530: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      ccd9cd96e43a4764d8c59e33c3ba4fd8524c0e0e   FIPS_PUB_140_Test_Certificate
fips.sh: #8531: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #8532: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #8533: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcertdb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcerthi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcrmf.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libcryptohi.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libfreebl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libjar.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnspr4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnss3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssb.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckbi.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssckfw.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdbm3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssdev.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnsspki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libnssutil3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpk11wrap.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs12.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkcs7.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcertsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixchecker.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixcrlsel.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixmodule.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixparams.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixpki.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixresults.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixstore.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixsystem.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixtop.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libpkixutil.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplc4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libplds4.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsectool.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsmime3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.chk /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsoftokn3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libsqlite3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl.a /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
cp /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/lib/libssl3.dylib /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle/libsoftokn3.dylib
mangle -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle/libsoftokn3.dylib -o -8 -b 5
Changing byte 0x00048078 (295032): from 65 (101) to 45 (69)
DYLD_LIBRARY_PATH=/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/fips/mangle dbtest -r -d ../fips
fips.sh: #8534: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 18:04:30 PST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 18:04:30 PST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #8535: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #8536: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 18:04:31 PST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 18:04:31 PST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #8537: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8538: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #8539: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #8540: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #8541: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #8542: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8543: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #8544: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #8545: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #8546: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #8547: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8548: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #8549: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #8550: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #8551: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #8552: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8553: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #8554: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #8555: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #8556: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #8557: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8558: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #8559: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #8560: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #8561: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #8562: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8563: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #8564: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #8565: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #8566: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #8567: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8568: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #8569: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #8570: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #8571: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #8572: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8573: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #8574: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #8575: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #8576: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #8577: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #8578: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #8579: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #8580: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #8581: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #8582: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #8583: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #8584: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #8585: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #8586: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #8587: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #8588: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #8589: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #8590: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #8591: Decode Encrypted-Data . - PASSED
smime.sh: #8592: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #8593: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #8594: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #8595: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #8596: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #8597: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 18:04:41 PST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 18:04:41 PST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96665 >/dev/null 2>/dev/null
selfserv with PID 96665 found at Tue Nov 27 18:04:41 PST 2012
selfserv with PID 96665 started at Tue Nov 27 18:04:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8598: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96665 at Tue Nov 27 18:04:42 PST 2012
kill -USR1 96665
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96665 killed at Tue Nov 27 18:04:42 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96712 >/dev/null 2>/dev/null
selfserv with PID 96712 found at Tue Nov 27 18:04:42 PST 2012
selfserv with PID 96712 started at Tue Nov 27 18:04:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8599: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96712 at Tue Nov 27 18:04:42 PST 2012
kill -USR1 96712
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96712 killed at Tue Nov 27 18:04:42 PST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96759 >/dev/null 2>/dev/null
selfserv with PID 96759 found at Tue Nov 27 18:04:42 PST 2012
selfserv with PID 96759 started at Tue Nov 27 18:04:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8600: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96759 at Tue Nov 27 18:04:42 PST 2012
kill -USR1 96759
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96759 killed at Tue Nov 27 18:04:42 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96818 >/dev/null 2>/dev/null
selfserv with PID 96818 found at Tue Nov 27 18:04:43 PST 2012
selfserv with PID 96818 started at Tue Nov 27 18:04:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8601: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96818 at Tue Nov 27 18:04:43 PST 2012
kill -USR1 96818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96818 killed at Tue Nov 27 18:04:43 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96865 >/dev/null 2>/dev/null
selfserv with PID 96865 found at Tue Nov 27 18:04:43 PST 2012
selfserv with PID 96865 started at Tue Nov 27 18:04:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8602: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96865 at Tue Nov 27 18:04:43 PST 2012
kill -USR1 96865
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96865 killed at Tue Nov 27 18:04:43 PST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96912 >/dev/null 2>/dev/null
selfserv with PID 96912 found at Tue Nov 27 18:04:43 PST 2012
selfserv with PID 96912 started at Tue Nov 27 18:04:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8603: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 96912 at Tue Nov 27 18:04:44 PST 2012
kill -USR1 96912
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96912 killed at Tue Nov 27 18:04:44 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 96981 >/dev/null 2>/dev/null
selfserv with PID 96981 found at Tue Nov 27 18:04:44 PST 2012
selfserv with PID 96981 started at Tue Nov 27 18:04:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8604: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 96981 at Tue Nov 27 18:04:44 PST 2012
kill -USR1 96981
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 96981 killed at Tue Nov 27 18:04:44 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97028 >/dev/null 2>/dev/null
selfserv with PID 97028 found at Tue Nov 27 18:04:44 PST 2012
selfserv with PID 97028 started at Tue Nov 27 18:04:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8605: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97028 at Tue Nov 27 18:04:45 PST 2012
kill -USR1 97028
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97028 killed at Tue Nov 27 18:04:45 PST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97075 >/dev/null 2>/dev/null
selfserv with PID 97075 found at Tue Nov 27 18:04:45 PST 2012
selfserv with PID 97075 started at Tue Nov 27 18:04:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8606: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97075 at Tue Nov 27 18:04:45 PST 2012
kill -USR1 97075
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97075 killed at Tue Nov 27 18:04:45 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97134 >/dev/null 2>/dev/null
selfserv with PID 97134 found at Tue Nov 27 18:04:45 PST 2012
selfserv with PID 97134 started at Tue Nov 27 18:04:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8607: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97134 at Tue Nov 27 18:04:46 PST 2012
kill -USR1 97134
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97134 killed at Tue Nov 27 18:04:46 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97181 >/dev/null 2>/dev/null
selfserv with PID 97181 found at Tue Nov 27 18:04:46 PST 2012
selfserv with PID 97181 started at Tue Nov 27 18:04:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8608: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97181 at Tue Nov 27 18:04:46 PST 2012
kill -USR1 97181
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97181 killed at Tue Nov 27 18:04:46 PST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97228 >/dev/null 2>/dev/null
selfserv with PID 97228 found at Tue Nov 27 18:04:46 PST 2012
selfserv with PID 97228 started at Tue Nov 27 18:04:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8609: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97228 at Tue Nov 27 18:04:46 PST 2012
kill -USR1 97228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97228 killed at Tue Nov 27 18:04:46 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97287 >/dev/null 2>/dev/null
selfserv with PID 97287 found at Tue Nov 27 18:04:47 PST 2012
selfserv with PID 97287 started at Tue Nov 27 18:04:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8610: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97287 at Tue Nov 27 18:04:47 PST 2012
kill -USR1 97287
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97287 killed at Tue Nov 27 18:04:47 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97334 >/dev/null 2>/dev/null
selfserv with PID 97334 found at Tue Nov 27 18:04:47 PST 2012
selfserv with PID 97334 started at Tue Nov 27 18:04:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8611: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97334 at Tue Nov 27 18:04:47 PST 2012
kill -USR1 97334
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97334 killed at Tue Nov 27 18:04:47 PST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97381 >/dev/null 2>/dev/null
selfserv with PID 97381 found at Tue Nov 27 18:04:47 PST 2012
selfserv with PID 97381 started at Tue Nov 27 18:04:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8612: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97381 at Tue Nov 27 18:04:48 PST 2012
kill -USR1 97381
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97381 killed at Tue Nov 27 18:04:48 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97440 >/dev/null 2>/dev/null
selfserv with PID 97440 found at Tue Nov 27 18:04:48 PST 2012
selfserv with PID 97440 started at Tue Nov 27 18:04:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8613: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97440 at Tue Nov 27 18:04:48 PST 2012
kill -USR1 97440
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97440 killed at Tue Nov 27 18:04:48 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97487 >/dev/null 2>/dev/null
selfserv with PID 97487 found at Tue Nov 27 18:04:48 PST 2012
selfserv with PID 97487 started at Tue Nov 27 18:04:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8614: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97487 at Tue Nov 27 18:04:49 PST 2012
kill -USR1 97487
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97487 killed at Tue Nov 27 18:04:49 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97534 >/dev/null 2>/dev/null
selfserv with PID 97534 found at Tue Nov 27 18:04:49 PST 2012
selfserv with PID 97534 started at Tue Nov 27 18:04:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8615: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97534 at Tue Nov 27 18:04:49 PST 2012
kill -USR1 97534
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97534 killed at Tue Nov 27 18:04:49 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97593 >/dev/null 2>/dev/null
selfserv with PID 97593 found at Tue Nov 27 18:04:49 PST 2012
selfserv with PID 97593 started at Tue Nov 27 18:04:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8616: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97593 at Tue Nov 27 18:04:50 PST 2012
kill -USR1 97593
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97593 killed at Tue Nov 27 18:04:50 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97640 >/dev/null 2>/dev/null
selfserv with PID 97640 found at Tue Nov 27 18:04:50 PST 2012
selfserv with PID 97640 started at Tue Nov 27 18:04:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8617: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97640 at Tue Nov 27 18:04:50 PST 2012
kill -USR1 97640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97640 killed at Tue Nov 27 18:04:50 PST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97687 >/dev/null 2>/dev/null
selfserv with PID 97687 found at Tue Nov 27 18:04:50 PST 2012
selfserv with PID 97687 started at Tue Nov 27 18:04:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8618: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97687 at Tue Nov 27 18:04:50 PST 2012
kill -USR1 97687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97687 killed at Tue Nov 27 18:04:50 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97746 >/dev/null 2>/dev/null
selfserv with PID 97746 found at Tue Nov 27 18:04:51 PST 2012
selfserv with PID 97746 started at Tue Nov 27 18:04:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8619: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97746 at Tue Nov 27 18:04:51 PST 2012
kill -USR1 97746
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97746 killed at Tue Nov 27 18:04:51 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97793 >/dev/null 2>/dev/null
selfserv with PID 97793 found at Tue Nov 27 18:04:51 PST 2012
selfserv with PID 97793 started at Tue Nov 27 18:04:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8620: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97793 at Tue Nov 27 18:04:51 PST 2012
kill -USR1 97793
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97793 killed at Tue Nov 27 18:04:51 PST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:51 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97840 >/dev/null 2>/dev/null
selfserv with PID 97840 found at Tue Nov 27 18:04:51 PST 2012
selfserv with PID 97840 started at Tue Nov 27 18:04:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8621: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97840 at Tue Nov 27 18:04:52 PST 2012
kill -USR1 97840
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97840 killed at Tue Nov 27 18:04:52 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97899 >/dev/null 2>/dev/null
selfserv with PID 97899 found at Tue Nov 27 18:04:52 PST 2012
selfserv with PID 97899 started at Tue Nov 27 18:04:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8622: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97899 at Tue Nov 27 18:04:52 PST 2012
kill -USR1 97899
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97899 killed at Tue Nov 27 18:04:52 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:52 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97946 >/dev/null 2>/dev/null
selfserv with PID 97946 found at Tue Nov 27 18:04:52 PST 2012
selfserv with PID 97946 started at Tue Nov 27 18:04:52 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8623: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 97946 at Tue Nov 27 18:04:53 PST 2012
kill -USR1 97946
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97946 killed at Tue Nov 27 18:04:53 PST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 97993 >/dev/null 2>/dev/null
selfserv with PID 97993 found at Tue Nov 27 18:04:53 PST 2012
selfserv with PID 97993 started at Tue Nov 27 18:04:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8624: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 97993 at Tue Nov 27 18:04:53 PST 2012
kill -USR1 97993
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 97993 killed at Tue Nov 27 18:04:53 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:53 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98052 >/dev/null 2>/dev/null
selfserv with PID 98052 found at Tue Nov 27 18:04:53 PST 2012
selfserv with PID 98052 started at Tue Nov 27 18:04:53 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8625: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98052 at Tue Nov 27 18:04:54 PST 2012
kill -USR1 98052
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98052 killed at Tue Nov 27 18:04:54 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98099 >/dev/null 2>/dev/null
selfserv with PID 98099 found at Tue Nov 27 18:04:54 PST 2012
selfserv with PID 98099 started at Tue Nov 27 18:04:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8626: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98099 at Tue Nov 27 18:04:54 PST 2012
kill -USR1 98099
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98099 killed at Tue Nov 27 18:04:54 PST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:54 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98146 >/dev/null 2>/dev/null
selfserv with PID 98146 found at Tue Nov 27 18:04:54 PST 2012
selfserv with PID 98146 started at Tue Nov 27 18:04:54 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8627: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98146 at Tue Nov 27 18:04:54 PST 2012
kill -USR1 98146
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98146 killed at Tue Nov 27 18:04:54 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98205 >/dev/null 2>/dev/null
selfserv with PID 98205 found at Tue Nov 27 18:04:55 PST 2012
selfserv with PID 98205 started at Tue Nov 27 18:04:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8628: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98205 at Tue Nov 27 18:04:55 PST 2012
kill -USR1 98205
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98205 killed at Tue Nov 27 18:04:55 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98252 >/dev/null 2>/dev/null
selfserv with PID 98252 found at Tue Nov 27 18:04:55 PST 2012
selfserv with PID 98252 started at Tue Nov 27 18:04:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8629: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98252 at Tue Nov 27 18:04:55 PST 2012
kill -USR1 98252
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98252 killed at Tue Nov 27 18:04:55 PST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:04:55 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98299 >/dev/null 2>/dev/null
selfserv with PID 98299 found at Tue Nov 27 18:04:55 PST 2012
selfserv with PID 98299 started at Tue Nov 27 18:04:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8630: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98299 at Tue Nov 27 18:04:56 PST 2012
kill -USR1 98299
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98299 killed at Tue Nov 27 18:04:56 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98358 >/dev/null 2>/dev/null
selfserv with PID 98358 found at Tue Nov 27 18:04:56 PST 2012
selfserv with PID 98358 started at Tue Nov 27 18:04:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8631: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98358 at Tue Nov 27 18:04:56 PST 2012
kill -USR1 98358
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98358 killed at Tue Nov 27 18:04:56 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:56 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98405 >/dev/null 2>/dev/null
selfserv with PID 98405 found at Tue Nov 27 18:04:56 PST 2012
selfserv with PID 98405 started at Tue Nov 27 18:04:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8632: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98405 at Tue Nov 27 18:04:57 PST 2012
kill -USR1 98405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98405 killed at Tue Nov 27 18:04:57 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:04:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98452 >/dev/null 2>/dev/null
selfserv with PID 98452 found at Tue Nov 27 18:04:57 PST 2012
selfserv with PID 98452 started at Tue Nov 27 18:04:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8633: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 98452 at Tue Nov 27 18:04:57 PST 2012
kill -USR1 98452
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98452 killed at Tue Nov 27 18:04:57 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:57 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98511 >/dev/null 2>/dev/null
selfserv with PID 98511 found at Tue Nov 27 18:04:57 PST 2012
selfserv with PID 98511 started at Tue Nov 27 18:04:57 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8634: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98511 at Tue Nov 27 18:04:58 PST 2012
kill -USR1 98511
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98511 killed at Tue Nov 27 18:04:58 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98558 >/dev/null 2>/dev/null
selfserv with PID 98558 found at Tue Nov 27 18:04:58 PST 2012
selfserv with PID 98558 started at Tue Nov 27 18:04:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8635: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98558 at Tue Nov 27 18:04:58 PST 2012
kill -USR1 98558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98558 killed at Tue Nov 27 18:04:58 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:04:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98605 >/dev/null 2>/dev/null
selfserv with PID 98605 found at Tue Nov 27 18:04:58 PST 2012
selfserv with PID 98605 started at Tue Nov 27 18:04:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8636: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98605 at Tue Nov 27 18:04:59 PST 2012
kill -USR1 98605
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98605 killed at Tue Nov 27 18:04:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:04:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98664 >/dev/null 2>/dev/null
selfserv with PID 98664 found at Tue Nov 27 18:04:59 PST 2012
selfserv with PID 98664 started at Tue Nov 27 18:04:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8637: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98664 at Tue Nov 27 18:04:59 PST 2012
kill -USR1 98664
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98664 killed at Tue Nov 27 18:04:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:04:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98711 >/dev/null 2>/dev/null
selfserv with PID 98711 found at Tue Nov 27 18:04:59 PST 2012
selfserv with PID 98711 started at Tue Nov 27 18:04:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8638: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98711 at Tue Nov 27 18:04:59 PST 2012
kill -USR1 98711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98711 killed at Tue Nov 27 18:04:59 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:04:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:04:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98758 >/dev/null 2>/dev/null
selfserv with PID 98758 found at Tue Nov 27 18:05:00 PST 2012
selfserv with PID 98758 started at Tue Nov 27 18:05:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8639: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98758 at Tue Nov 27 18:05:00 PST 2012
kill -USR1 98758
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98758 killed at Tue Nov 27 18:05:00 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98817 >/dev/null 2>/dev/null
selfserv with PID 98817 found at Tue Nov 27 18:05:00 PST 2012
selfserv with PID 98817 started at Tue Nov 27 18:05:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8640: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98817 at Tue Nov 27 18:05:01 PST 2012
kill -USR1 98817
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98817 killed at Tue Nov 27 18:05:01 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98864 >/dev/null 2>/dev/null
selfserv with PID 98864 found at Tue Nov 27 18:05:01 PST 2012
selfserv with PID 98864 started at Tue Nov 27 18:05:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8641: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 98864 at Tue Nov 27 18:05:01 PST 2012
kill -USR1 98864
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98864 killed at Tue Nov 27 18:05:01 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98911 >/dev/null 2>/dev/null
selfserv with PID 98911 found at Tue Nov 27 18:05:01 PST 2012
selfserv with PID 98911 started at Tue Nov 27 18:05:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8642: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98911 at Tue Nov 27 18:05:01 PST 2012
kill -USR1 98911
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98911 killed at Tue Nov 27 18:05:01 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 98970 >/dev/null 2>/dev/null
selfserv with PID 98970 found at Tue Nov 27 18:05:02 PST 2012
selfserv with PID 98970 started at Tue Nov 27 18:05:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8643: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 98970 at Tue Nov 27 18:05:02 PST 2012
kill -USR1 98970
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 98970 killed at Tue Nov 27 18:05:02 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99017 >/dev/null 2>/dev/null
selfserv with PID 99017 found at Tue Nov 27 18:05:02 PST 2012
selfserv with PID 99017 started at Tue Nov 27 18:05:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8644: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99017 at Tue Nov 27 18:05:02 PST 2012
kill -USR1 99017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99017 killed at Tue Nov 27 18:05:02 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99064 >/dev/null 2>/dev/null
selfserv with PID 99064 found at Tue Nov 27 18:05:02 PST 2012
selfserv with PID 99064 started at Tue Nov 27 18:05:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8645: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99064 at Tue Nov 27 18:05:03 PST 2012
kill -USR1 99064
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99064 killed at Tue Nov 27 18:05:03 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99123 >/dev/null 2>/dev/null
selfserv with PID 99123 found at Tue Nov 27 18:05:03 PST 2012
selfserv with PID 99123 started at Tue Nov 27 18:05:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8646: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99123 at Tue Nov 27 18:05:03 PST 2012
kill -USR1 99123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99123 killed at Tue Nov 27 18:05:03 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99170 >/dev/null 2>/dev/null
selfserv with PID 99170 found at Tue Nov 27 18:05:03 PST 2012
selfserv with PID 99170 started at Tue Nov 27 18:05:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8647: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99170 at Tue Nov 27 18:05:04 PST 2012
kill -USR1 99170
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99170 killed at Tue Nov 27 18:05:04 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99217 >/dev/null 2>/dev/null
selfserv with PID 99217 found at Tue Nov 27 18:05:04 PST 2012
selfserv with PID 99217 started at Tue Nov 27 18:05:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8648: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99217 at Tue Nov 27 18:05:04 PST 2012
kill -USR1 99217
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99217 killed at Tue Nov 27 18:05:04 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:04 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99276 >/dev/null 2>/dev/null
selfserv with PID 99276 found at Tue Nov 27 18:05:04 PST 2012
selfserv with PID 99276 started at Tue Nov 27 18:05:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8649: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99276 at Tue Nov 27 18:05:05 PST 2012
kill -USR1 99276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99276 killed at Tue Nov 27 18:05:05 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99323 >/dev/null 2>/dev/null
selfserv with PID 99323 found at Tue Nov 27 18:05:05 PST 2012
selfserv with PID 99323 started at Tue Nov 27 18:05:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8650: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99323 at Tue Nov 27 18:05:05 PST 2012
kill -USR1 99323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99323 killed at Tue Nov 27 18:05:05 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99370 >/dev/null 2>/dev/null
selfserv with PID 99370 found at Tue Nov 27 18:05:05 PST 2012
selfserv with PID 99370 started at Tue Nov 27 18:05:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8651: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99370 at Tue Nov 27 18:05:06 PST 2012
kill -USR1 99370
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99370 killed at Tue Nov 27 18:05:06 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99429 >/dev/null 2>/dev/null
selfserv with PID 99429 found at Tue Nov 27 18:05:06 PST 2012
selfserv with PID 99429 started at Tue Nov 27 18:05:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8652: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99429 at Tue Nov 27 18:05:06 PST 2012
kill -USR1 99429
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99429 killed at Tue Nov 27 18:05:06 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99476 >/dev/null 2>/dev/null
selfserv with PID 99476 found at Tue Nov 27 18:05:06 PST 2012
selfserv with PID 99476 started at Tue Nov 27 18:05:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8653: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99476 at Tue Nov 27 18:05:06 PST 2012
kill -USR1 99476
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99476 killed at Tue Nov 27 18:05:06 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99523 >/dev/null 2>/dev/null
selfserv with PID 99523 found at Tue Nov 27 18:05:07 PST 2012
selfserv with PID 99523 started at Tue Nov 27 18:05:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8654: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99523 at Tue Nov 27 18:05:07 PST 2012
kill -USR1 99523
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99523 killed at Tue Nov 27 18:05:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99582 >/dev/null 2>/dev/null
selfserv with PID 99582 found at Tue Nov 27 18:05:07 PST 2012
selfserv with PID 99582 started at Tue Nov 27 18:05:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8655: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99582 at Tue Nov 27 18:05:07 PST 2012
kill -USR1 99582
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99582 killed at Tue Nov 27 18:05:07 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:07 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99629 >/dev/null 2>/dev/null
selfserv with PID 99629 found at Tue Nov 27 18:05:07 PST 2012
selfserv with PID 99629 started at Tue Nov 27 18:05:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8656: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99629 at Tue Nov 27 18:05:08 PST 2012
kill -USR1 99629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99629 killed at Tue Nov 27 18:05:08 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99676 >/dev/null 2>/dev/null
selfserv with PID 99676 found at Tue Nov 27 18:05:08 PST 2012
selfserv with PID 99676 started at Tue Nov 27 18:05:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8657: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99676 at Tue Nov 27 18:05:08 PST 2012
kill -USR1 99676
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99676 killed at Tue Nov 27 18:05:08 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99735 >/dev/null 2>/dev/null
selfserv with PID 99735 found at Tue Nov 27 18:05:08 PST 2012
selfserv with PID 99735 started at Tue Nov 27 18:05:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8658: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99735 at Tue Nov 27 18:05:09 PST 2012
kill -USR1 99735
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99735 killed at Tue Nov 27 18:05:09 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99782 >/dev/null 2>/dev/null
selfserv with PID 99782 found at Tue Nov 27 18:05:09 PST 2012
selfserv with PID 99782 started at Tue Nov 27 18:05:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8659: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 99782 at Tue Nov 27 18:05:09 PST 2012
kill -USR1 99782
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99782 killed at Tue Nov 27 18:05:09 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99829 >/dev/null 2>/dev/null
selfserv with PID 99829 found at Tue Nov 27 18:05:09 PST 2012
selfserv with PID 99829 started at Tue Nov 27 18:05:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8660: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99829 at Tue Nov 27 18:05:10 PST 2012
kill -USR1 99829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99829 killed at Tue Nov 27 18:05:10 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99888 >/dev/null 2>/dev/null
selfserv with PID 99888 found at Tue Nov 27 18:05:10 PST 2012
selfserv with PID 99888 started at Tue Nov 27 18:05:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8661: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99888 at Tue Nov 27 18:05:10 PST 2012
kill -USR1 99888
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99888 killed at Tue Nov 27 18:05:10 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99935 >/dev/null 2>/dev/null
selfserv with PID 99935 found at Tue Nov 27 18:05:10 PST 2012
selfserv with PID 99935 started at Tue Nov 27 18:05:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8662: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99935 at Tue Nov 27 18:05:11 PST 2012
kill -USR1 99935
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99935 killed at Tue Nov 27 18:05:11 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 99982 >/dev/null 2>/dev/null
selfserv with PID 99982 found at Tue Nov 27 18:05:11 PST 2012
selfserv with PID 99982 started at Tue Nov 27 18:05:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8663: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 99982 at Tue Nov 27 18:05:11 PST 2012
kill -USR1 99982
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 99982 killed at Tue Nov 27 18:05:11 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 154 >/dev/null 2>/dev/null
selfserv with PID 154 found at Tue Nov 27 18:05:11 PST 2012
selfserv with PID 154 started at Tue Nov 27 18:05:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8664: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 154 at Tue Nov 27 18:05:11 PST 2012
kill -USR1 154
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 154 killed at Tue Nov 27 18:05:11 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 214 >/dev/null 2>/dev/null
selfserv with PID 214 found at Tue Nov 27 18:05:12 PST 2012
selfserv with PID 214 started at Tue Nov 27 18:05:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8665: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 214 at Tue Nov 27 18:05:12 PST 2012
kill -USR1 214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 214 killed at Tue Nov 27 18:05:12 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 264 >/dev/null 2>/dev/null
selfserv with PID 264 found at Tue Nov 27 18:05:12 PST 2012
selfserv with PID 264 started at Tue Nov 27 18:05:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8666: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 264 at Tue Nov 27 18:05:12 PST 2012
kill -USR1 264
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 264 killed at Tue Nov 27 18:05:12 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 323 >/dev/null 2>/dev/null
selfserv with PID 323 found at Tue Nov 27 18:05:12 PST 2012
selfserv with PID 323 started at Tue Nov 27 18:05:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8667: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 323 at Tue Nov 27 18:05:13 PST 2012
kill -USR1 323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 323 killed at Tue Nov 27 18:05:13 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 370 >/dev/null 2>/dev/null
selfserv with PID 370 found at Tue Nov 27 18:05:13 PST 2012
selfserv with PID 370 started at Tue Nov 27 18:05:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8668: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 370 at Tue Nov 27 18:05:13 PST 2012
kill -USR1 370
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 370 killed at Tue Nov 27 18:05:13 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 417 >/dev/null 2>/dev/null
selfserv with PID 417 found at Tue Nov 27 18:05:13 PST 2012
selfserv with PID 417 started at Tue Nov 27 18:05:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8669: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 417 at Tue Nov 27 18:05:14 PST 2012
kill -USR1 417
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 417 killed at Tue Nov 27 18:05:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 476 >/dev/null 2>/dev/null
selfserv with PID 476 found at Tue Nov 27 18:05:14 PST 2012
selfserv with PID 476 started at Tue Nov 27 18:05:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8670: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 476 at Tue Nov 27 18:05:14 PST 2012
kill -USR1 476
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 476 killed at Tue Nov 27 18:05:14 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 523 >/dev/null 2>/dev/null
selfserv with PID 523 found at Tue Nov 27 18:05:14 PST 2012
selfserv with PID 523 started at Tue Nov 27 18:05:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8671: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 523 at Tue Nov 27 18:05:15 PST 2012
kill -USR1 523
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 523 killed at Tue Nov 27 18:05:15 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 570 >/dev/null 2>/dev/null
selfserv with PID 570 found at Tue Nov 27 18:05:15 PST 2012
selfserv with PID 570 started at Tue Nov 27 18:05:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8672: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 570 at Tue Nov 27 18:05:15 PST 2012
kill -USR1 570
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 570 killed at Tue Nov 27 18:05:15 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 629 >/dev/null 2>/dev/null
selfserv with PID 629 found at Tue Nov 27 18:05:15 PST 2012
selfserv with PID 629 started at Tue Nov 27 18:05:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8673: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 629 at Tue Nov 27 18:05:16 PST 2012
kill -USR1 629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 629 killed at Tue Nov 27 18:05:16 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 678 >/dev/null 2>/dev/null
selfserv with PID 678 found at Tue Nov 27 18:05:16 PST 2012
selfserv with PID 678 started at Tue Nov 27 18:05:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8674: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 678 at Tue Nov 27 18:05:16 PST 2012
kill -USR1 678
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 678 killed at Tue Nov 27 18:05:16 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 725 >/dev/null 2>/dev/null
selfserv with PID 725 found at Tue Nov 27 18:05:16 PST 2012
selfserv with PID 725 started at Tue Nov 27 18:05:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8675: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 725 at Tue Nov 27 18:05:16 PST 2012
kill -USR1 725
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 725 killed at Tue Nov 27 18:05:16 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:16 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:16 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 784 >/dev/null 2>/dev/null
selfserv with PID 784 found at Tue Nov 27 18:05:17 PST 2012
selfserv with PID 784 started at Tue Nov 27 18:05:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8676: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 784 at Tue Nov 27 18:05:17 PST 2012
kill -USR1 784
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 784 killed at Tue Nov 27 18:05:17 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 831 >/dev/null 2>/dev/null
selfserv with PID 831 found at Tue Nov 27 18:05:17 PST 2012
selfserv with PID 831 started at Tue Nov 27 18:05:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8677: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 831 at Tue Nov 27 18:05:17 PST 2012
kill -USR1 831
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 831 killed at Tue Nov 27 18:05:17 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 878 >/dev/null 2>/dev/null
selfserv with PID 878 found at Tue Nov 27 18:05:17 PST 2012
selfserv with PID 878 started at Tue Nov 27 18:05:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8678: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 878 at Tue Nov 27 18:05:18 PST 2012
kill -USR1 878
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 878 killed at Tue Nov 27 18:05:18 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 937 >/dev/null 2>/dev/null
selfserv with PID 937 found at Tue Nov 27 18:05:18 PST 2012
selfserv with PID 937 started at Tue Nov 27 18:05:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8679: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 937 at Tue Nov 27 18:05:18 PST 2012
kill -USR1 937
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 937 killed at Tue Nov 27 18:05:18 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:18 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 984 >/dev/null 2>/dev/null
selfserv with PID 984 found at Tue Nov 27 18:05:18 PST 2012
selfserv with PID 984 started at Tue Nov 27 18:05:18 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8680: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 984 at Tue Nov 27 18:05:19 PST 2012
kill -USR1 984
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 984 killed at Tue Nov 27 18:05:19 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:05:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1031 >/dev/null 2>/dev/null
selfserv with PID 1031 found at Tue Nov 27 18:05:19 PST 2012
selfserv with PID 1031 started at Tue Nov 27 18:05:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8681: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1031 at Tue Nov 27 18:05:19 PST 2012
kill -USR1 1031
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1031 killed at Tue Nov 27 18:05:19 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1090 >/dev/null 2>/dev/null
selfserv with PID 1090 found at Tue Nov 27 18:05:19 PST 2012
selfserv with PID 1090 started at Tue Nov 27 18:05:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8682: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1090 at Tue Nov 27 18:05:20 PST 2012
kill -USR1 1090
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1090 killed at Tue Nov 27 18:05:20 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1137 >/dev/null 2>/dev/null
selfserv with PID 1137 found at Tue Nov 27 18:05:20 PST 2012
selfserv with PID 1137 started at Tue Nov 27 18:05:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8683: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1137 at Tue Nov 27 18:05:20 PST 2012
kill -USR1 1137
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1137 killed at Tue Nov 27 18:05:20 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:05:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1184 >/dev/null 2>/dev/null
selfserv with PID 1184 found at Tue Nov 27 18:05:20 PST 2012
selfserv with PID 1184 started at Tue Nov 27 18:05:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8684: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1184 at Tue Nov 27 18:05:20 PST 2012
kill -USR1 1184
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1184 killed at Tue Nov 27 18:05:20 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1243 >/dev/null 2>/dev/null
selfserv with PID 1243 found at Tue Nov 27 18:05:21 PST 2012
selfserv with PID 1243 started at Tue Nov 27 18:05:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8685: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1243 at Tue Nov 27 18:05:21 PST 2012
kill -USR1 1243
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1243 killed at Tue Nov 27 18:05:21 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1290 >/dev/null 2>/dev/null
selfserv with PID 1290 found at Tue Nov 27 18:05:21 PST 2012
selfserv with PID 1290 started at Tue Nov 27 18:05:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8686: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1290 at Tue Nov 27 18:05:21 PST 2012
kill -USR1 1290
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1290 killed at Tue Nov 27 18:05:21 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:05:21 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1337 >/dev/null 2>/dev/null
selfserv with PID 1337 found at Tue Nov 27 18:05:21 PST 2012
selfserv with PID 1337 started at Tue Nov 27 18:05:21 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8687: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1337 at Tue Nov 27 18:05:22 PST 2012
kill -USR1 1337
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1337 killed at Tue Nov 27 18:05:22 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1405 >/dev/null 2>/dev/null
selfserv with PID 1405 found at Tue Nov 27 18:05:22 PST 2012
selfserv with PID 1405 started at Tue Nov 27 18:05:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8688: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1405 at Tue Nov 27 18:05:22 PST 2012
kill -USR1 1405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1405 killed at Tue Nov 27 18:05:22 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1452 >/dev/null 2>/dev/null
selfserv with PID 1452 found at Tue Nov 27 18:05:22 PST 2012
selfserv with PID 1452 started at Tue Nov 27 18:05:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8689: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1452 at Tue Nov 27 18:05:23 PST 2012
kill -USR1 1452
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1452 killed at Tue Nov 27 18:05:23 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1499 >/dev/null 2>/dev/null
selfserv with PID 1499 found at Tue Nov 27 18:05:23 PST 2012
selfserv with PID 1499 started at Tue Nov 27 18:05:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8690: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1499 at Tue Nov 27 18:05:23 PST 2012
kill -USR1 1499
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1499 killed at Tue Nov 27 18:05:23 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1558 >/dev/null 2>/dev/null
selfserv with PID 1558 found at Tue Nov 27 18:05:23 PST 2012
selfserv with PID 1558 started at Tue Nov 27 18:05:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8691: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1558 at Tue Nov 27 18:05:24 PST 2012
kill -USR1 1558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1558 killed at Tue Nov 27 18:05:24 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1605 >/dev/null 2>/dev/null
selfserv with PID 1605 found at Tue Nov 27 18:05:24 PST 2012
selfserv with PID 1605 started at Tue Nov 27 18:05:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8692: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1605 at Tue Nov 27 18:05:24 PST 2012
kill -USR1 1605
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1605 killed at Tue Nov 27 18:05:24 PST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1652 >/dev/null 2>/dev/null
selfserv with PID 1652 found at Tue Nov 27 18:05:24 PST 2012
selfserv with PID 1652 started at Tue Nov 27 18:05:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8693: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1652 at Tue Nov 27 18:05:25 PST 2012
kill -USR1 1652
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1652 killed at Tue Nov 27 18:05:25 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1711 >/dev/null 2>/dev/null
selfserv with PID 1711 found at Tue Nov 27 18:05:25 PST 2012
selfserv with PID 1711 started at Tue Nov 27 18:05:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8694: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1711 at Tue Nov 27 18:05:25 PST 2012
kill -USR1 1711
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1711 killed at Tue Nov 27 18:05:25 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:25 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1758 >/dev/null 2>/dev/null
selfserv with PID 1758 found at Tue Nov 27 18:05:25 PST 2012
selfserv with PID 1758 started at Tue Nov 27 18:05:25 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8695: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1758 at Tue Nov 27 18:05:26 PST 2012
kill -USR1 1758
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1758 killed at Tue Nov 27 18:05:26 PST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1805 >/dev/null 2>/dev/null
selfserv with PID 1805 found at Tue Nov 27 18:05:26 PST 2012
selfserv with PID 1805 started at Tue Nov 27 18:05:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8696: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1805 at Tue Nov 27 18:05:26 PST 2012
kill -USR1 1805
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1805 killed at Tue Nov 27 18:05:26 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1864 >/dev/null 2>/dev/null
selfserv with PID 1864 found at Tue Nov 27 18:05:26 PST 2012
selfserv with PID 1864 started at Tue Nov 27 18:05:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8697: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1864 at Tue Nov 27 18:05:26 PST 2012
kill -USR1 1864
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1864 killed at Tue Nov 27 18:05:26 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1911 >/dev/null 2>/dev/null
selfserv with PID 1911 found at Tue Nov 27 18:05:27 PST 2012
selfserv with PID 1911 started at Tue Nov 27 18:05:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8698: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1911 at Tue Nov 27 18:05:27 PST 2012
kill -USR1 1911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1911 killed at Tue Nov 27 18:05:27 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 1958 >/dev/null 2>/dev/null
selfserv with PID 1958 found at Tue Nov 27 18:05:27 PST 2012
selfserv with PID 1958 started at Tue Nov 27 18:05:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8699: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1958 at Tue Nov 27 18:05:27 PST 2012
kill -USR1 1958
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 1958 killed at Tue Nov 27 18:05:27 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:27 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:27 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2017 >/dev/null 2>/dev/null
selfserv with PID 2017 found at Tue Nov 27 18:05:28 PST 2012
selfserv with PID 2017 started at Tue Nov 27 18:05:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8700: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2017 at Tue Nov 27 18:05:28 PST 2012
kill -USR1 2017
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2017 killed at Tue Nov 27 18:05:28 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2064 >/dev/null 2>/dev/null
selfserv with PID 2064 found at Tue Nov 27 18:05:28 PST 2012
selfserv with PID 2064 started at Tue Nov 27 18:05:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8701: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2064 at Tue Nov 27 18:05:28 PST 2012
kill -USR1 2064
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2064 killed at Tue Nov 27 18:05:28 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2111 >/dev/null 2>/dev/null
selfserv with PID 2111 found at Tue Nov 27 18:05:28 PST 2012
selfserv with PID 2111 started at Tue Nov 27 18:05:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8702: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2111 at Tue Nov 27 18:05:29 PST 2012
kill -USR1 2111
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2111 killed at Tue Nov 27 18:05:29 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2170 >/dev/null 2>/dev/null
selfserv with PID 2170 found at Tue Nov 27 18:05:29 PST 2012
selfserv with PID 2170 started at Tue Nov 27 18:05:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8703: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2170 at Tue Nov 27 18:05:29 PST 2012
kill -USR1 2170
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2170 killed at Tue Nov 27 18:05:29 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2217 >/dev/null 2>/dev/null
selfserv with PID 2217 found at Tue Nov 27 18:05:29 PST 2012
selfserv with PID 2217 started at Tue Nov 27 18:05:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8704: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2217 at Tue Nov 27 18:05:30 PST 2012
kill -USR1 2217
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2217 killed at Tue Nov 27 18:05:30 PST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2264 >/dev/null 2>/dev/null
selfserv with PID 2264 found at Tue Nov 27 18:05:30 PST 2012
selfserv with PID 2264 started at Tue Nov 27 18:05:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8705: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2264 at Tue Nov 27 18:05:30 PST 2012
kill -USR1 2264
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2264 killed at Tue Nov 27 18:05:30 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2323 >/dev/null 2>/dev/null
selfserv with PID 2323 found at Tue Nov 27 18:05:30 PST 2012
selfserv with PID 2323 started at Tue Nov 27 18:05:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8706: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2323 at Tue Nov 27 18:05:31 PST 2012
kill -USR1 2323
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2323 killed at Tue Nov 27 18:05:31 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2370 >/dev/null 2>/dev/null
selfserv with PID 2370 found at Tue Nov 27 18:05:31 PST 2012
selfserv with PID 2370 started at Tue Nov 27 18:05:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8707: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2370 at Tue Nov 27 18:05:31 PST 2012
kill -USR1 2370
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2370 killed at Tue Nov 27 18:05:31 PST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2417 >/dev/null 2>/dev/null
selfserv with PID 2417 found at Tue Nov 27 18:05:32 PST 2012
selfserv with PID 2417 started at Tue Nov 27 18:05:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8708: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2417 at Tue Nov 27 18:05:32 PST 2012
kill -USR1 2417
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2417 killed at Tue Nov 27 18:05:32 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2476 >/dev/null 2>/dev/null
selfserv with PID 2476 found at Tue Nov 27 18:05:32 PST 2012
selfserv with PID 2476 started at Tue Nov 27 18:05:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8709: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2476 at Tue Nov 27 18:05:32 PST 2012
kill -USR1 2476
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2476 killed at Tue Nov 27 18:05:32 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2523 >/dev/null 2>/dev/null
selfserv with PID 2523 found at Tue Nov 27 18:05:32 PST 2012
selfserv with PID 2523 started at Tue Nov 27 18:05:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8710: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2523 at Tue Nov 27 18:05:33 PST 2012
kill -USR1 2523
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2523 killed at Tue Nov 27 18:05:33 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2570 >/dev/null 2>/dev/null
selfserv with PID 2570 found at Tue Nov 27 18:05:33 PST 2012
selfserv with PID 2570 started at Tue Nov 27 18:05:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8711: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2570 at Tue Nov 27 18:05:33 PST 2012
kill -USR1 2570
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2570 killed at Tue Nov 27 18:05:33 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2629 >/dev/null 2>/dev/null
selfserv with PID 2629 found at Tue Nov 27 18:05:33 PST 2012
selfserv with PID 2629 started at Tue Nov 27 18:05:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8712: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2629 at Tue Nov 27 18:05:34 PST 2012
kill -USR1 2629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2629 killed at Tue Nov 27 18:05:34 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2676 >/dev/null 2>/dev/null
selfserv with PID 2676 found at Tue Nov 27 18:05:34 PST 2012
selfserv with PID 2676 started at Tue Nov 27 18:05:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8713: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2676 at Tue Nov 27 18:05:34 PST 2012
kill -USR1 2676
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2676 killed at Tue Nov 27 18:05:34 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2723 >/dev/null 2>/dev/null
selfserv with PID 2723 found at Tue Nov 27 18:05:34 PST 2012
selfserv with PID 2723 started at Tue Nov 27 18:05:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8714: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2723 at Tue Nov 27 18:05:35 PST 2012
kill -USR1 2723
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2723 killed at Tue Nov 27 18:05:35 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 18:05:35 PST 2012
selfserv with PID 2782 started at Tue Nov 27 18:05:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8715: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2782 at Tue Nov 27 18:05:35 PST 2012
kill -USR1 2782
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2782 killed at Tue Nov 27 18:05:35 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:35 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2829 >/dev/null 2>/dev/null
selfserv with PID 2829 found at Tue Nov 27 18:05:35 PST 2012
selfserv with PID 2829 started at Tue Nov 27 18:05:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8716: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2829 at Tue Nov 27 18:05:36 PST 2012
kill -USR1 2829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2829 killed at Tue Nov 27 18:05:36 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2876 >/dev/null 2>/dev/null
selfserv with PID 2876 found at Tue Nov 27 18:05:36 PST 2012
selfserv with PID 2876 started at Tue Nov 27 18:05:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8717: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2876 at Tue Nov 27 18:05:36 PST 2012
kill -USR1 2876
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2876 killed at Tue Nov 27 18:05:36 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2935 >/dev/null 2>/dev/null
selfserv with PID 2935 found at Tue Nov 27 18:05:36 PST 2012
selfserv with PID 2935 started at Tue Nov 27 18:05:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8718: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2935 at Tue Nov 27 18:05:37 PST 2012
kill -USR1 2935
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2935 killed at Tue Nov 27 18:05:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 2982 >/dev/null 2>/dev/null
selfserv with PID 2982 found at Tue Nov 27 18:05:37 PST 2012
selfserv with PID 2982 started at Tue Nov 27 18:05:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8719: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2982 at Tue Nov 27 18:05:37 PST 2012
kill -USR1 2982
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 2982 killed at Tue Nov 27 18:05:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:37 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3029 >/dev/null 2>/dev/null
selfserv with PID 3029 found at Tue Nov 27 18:05:37 PST 2012
selfserv with PID 3029 started at Tue Nov 27 18:05:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8720: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3029 at Tue Nov 27 18:05:37 PST 2012
kill -USR1 3029
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3029 killed at Tue Nov 27 18:05:37 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3088 >/dev/null 2>/dev/null
selfserv with PID 3088 found at Tue Nov 27 18:05:38 PST 2012
selfserv with PID 3088 started at Tue Nov 27 18:05:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8721: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3088 at Tue Nov 27 18:05:38 PST 2012
kill -USR1 3088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3088 killed at Tue Nov 27 18:05:38 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3135 >/dev/null 2>/dev/null
selfserv with PID 3135 found at Tue Nov 27 18:05:38 PST 2012
selfserv with PID 3135 started at Tue Nov 27 18:05:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8722: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3135 at Tue Nov 27 18:05:38 PST 2012
kill -USR1 3135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3135 killed at Tue Nov 27 18:05:38 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:38 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3182 >/dev/null 2>/dev/null
selfserv with PID 3182 found at Tue Nov 27 18:05:39 PST 2012
selfserv with PID 3182 started at Tue Nov 27 18:05:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8723: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3182 at Tue Nov 27 18:05:39 PST 2012
kill -USR1 3182
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3182 killed at Tue Nov 27 18:05:39 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3241 >/dev/null 2>/dev/null
selfserv with PID 3241 found at Tue Nov 27 18:05:39 PST 2012
selfserv with PID 3241 started at Tue Nov 27 18:05:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8724: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3241 at Tue Nov 27 18:05:39 PST 2012
kill -USR1 3241
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3241 killed at Tue Nov 27 18:05:39 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:39 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3288 >/dev/null 2>/dev/null
selfserv with PID 3288 found at Tue Nov 27 18:05:39 PST 2012
selfserv with PID 3288 started at Tue Nov 27 18:05:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8725: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3288 at Tue Nov 27 18:05:40 PST 2012
kill -USR1 3288
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3288 killed at Tue Nov 27 18:05:40 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3335 >/dev/null 2>/dev/null
selfserv with PID 3335 found at Tue Nov 27 18:05:40 PST 2012
selfserv with PID 3335 started at Tue Nov 27 18:05:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8726: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3335 at Tue Nov 27 18:05:40 PST 2012
kill -USR1 3335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3335 killed at Tue Nov 27 18:05:40 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:40 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3394 >/dev/null 2>/dev/null
selfserv with PID 3394 found at Tue Nov 27 18:05:40 PST 2012
selfserv with PID 3394 started at Tue Nov 27 18:05:40 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8727: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3394 at Tue Nov 27 18:05:41 PST 2012
kill -USR1 3394
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3394 killed at Tue Nov 27 18:05:41 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3441 >/dev/null 2>/dev/null
selfserv with PID 3441 found at Tue Nov 27 18:05:41 PST 2012
selfserv with PID 3441 started at Tue Nov 27 18:05:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8728: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3441 at Tue Nov 27 18:05:41 PST 2012
kill -USR1 3441
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3441 killed at Tue Nov 27 18:05:41 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:41 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3488 >/dev/null 2>/dev/null
selfserv with PID 3488 found at Tue Nov 27 18:05:41 PST 2012
selfserv with PID 3488 started at Tue Nov 27 18:05:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8729: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3488 at Tue Nov 27 18:05:42 PST 2012
kill -USR1 3488
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3488 killed at Tue Nov 27 18:05:42 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3547 >/dev/null 2>/dev/null
selfserv with PID 3547 found at Tue Nov 27 18:05:42 PST 2012
selfserv with PID 3547 started at Tue Nov 27 18:05:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8730: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3547 at Tue Nov 27 18:05:42 PST 2012
kill -USR1 3547
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3547 killed at Tue Nov 27 18:05:42 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:42 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3594 >/dev/null 2>/dev/null
selfserv with PID 3594 found at Tue Nov 27 18:05:42 PST 2012
selfserv with PID 3594 started at Tue Nov 27 18:05:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8731: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3594 at Tue Nov 27 18:05:43 PST 2012
kill -USR1 3594
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3594 killed at Tue Nov 27 18:05:43 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3641 >/dev/null 2>/dev/null
selfserv with PID 3641 found at Tue Nov 27 18:05:43 PST 2012
selfserv with PID 3641 started at Tue Nov 27 18:05:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8732: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3641 at Tue Nov 27 18:05:43 PST 2012
kill -USR1 3641
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3641 killed at Tue Nov 27 18:05:43 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:43 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3700 >/dev/null 2>/dev/null
selfserv with PID 3700 found at Tue Nov 27 18:05:43 PST 2012
selfserv with PID 3700 started at Tue Nov 27 18:05:43 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8733: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3700 at Tue Nov 27 18:05:43 PST 2012
kill -USR1 3700
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3700 killed at Tue Nov 27 18:05:43 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3751 >/dev/null 2>/dev/null
selfserv with PID 3751 found at Tue Nov 27 18:05:44 PST 2012
selfserv with PID 3751 started at Tue Nov 27 18:05:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8734: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3751 at Tue Nov 27 18:05:44 PST 2012
kill -USR1 3751
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3751 killed at Tue Nov 27 18:05:44 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3804 >/dev/null 2>/dev/null
selfserv with PID 3804 found at Tue Nov 27 18:05:44 PST 2012
selfserv with PID 3804 started at Tue Nov 27 18:05:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8735: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3804 at Tue Nov 27 18:05:44 PST 2012
kill -USR1 3804
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3804 killed at Tue Nov 27 18:05:44 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:44 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3863 >/dev/null 2>/dev/null
selfserv with PID 3863 found at Tue Nov 27 18:05:45 PST 2012
selfserv with PID 3863 started at Tue Nov 27 18:05:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8736: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3863 at Tue Nov 27 18:05:45 PST 2012
kill -USR1 3863
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3863 killed at Tue Nov 27 18:05:45 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3910 >/dev/null 2>/dev/null
selfserv with PID 3910 found at Tue Nov 27 18:05:45 PST 2012
selfserv with PID 3910 started at Tue Nov 27 18:05:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8737: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3910 at Tue Nov 27 18:05:45 PST 2012
kill -USR1 3910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3910 killed at Tue Nov 27 18:05:45 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:45 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 3957 >/dev/null 2>/dev/null
selfserv with PID 3957 found at Tue Nov 27 18:05:45 PST 2012
selfserv with PID 3957 started at Tue Nov 27 18:05:45 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8738: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3957 at Tue Nov 27 18:05:46 PST 2012
kill -USR1 3957
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 3957 killed at Tue Nov 27 18:05:46 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4016 >/dev/null 2>/dev/null
selfserv with PID 4016 found at Tue Nov 27 18:05:46 PST 2012
selfserv with PID 4016 started at Tue Nov 27 18:05:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8739: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4016 at Tue Nov 27 18:05:46 PST 2012
kill -USR1 4016
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4016 killed at Tue Nov 27 18:05:46 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4063 >/dev/null 2>/dev/null
selfserv with PID 4063 found at Tue Nov 27 18:05:46 PST 2012
selfserv with PID 4063 started at Tue Nov 27 18:05:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8740: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4063 at Tue Nov 27 18:05:47 PST 2012
kill -USR1 4063
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4063 killed at Tue Nov 27 18:05:47 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4110 >/dev/null 2>/dev/null
selfserv with PID 4110 found at Tue Nov 27 18:05:47 PST 2012
selfserv with PID 4110 started at Tue Nov 27 18:05:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8741: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4110 at Tue Nov 27 18:05:47 PST 2012
kill -USR1 4110
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4110 killed at Tue Nov 27 18:05:47 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4169 >/dev/null 2>/dev/null
selfserv with PID 4169 found at Tue Nov 27 18:05:47 PST 2012
selfserv with PID 4169 started at Tue Nov 27 18:05:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8742: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4169 at Tue Nov 27 18:05:48 PST 2012
kill -USR1 4169
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4169 killed at Tue Nov 27 18:05:48 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4216 >/dev/null 2>/dev/null
selfserv with PID 4216 found at Tue Nov 27 18:05:48 PST 2012
selfserv with PID 4216 started at Tue Nov 27 18:05:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8743: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4216 at Tue Nov 27 18:05:48 PST 2012
kill -USR1 4216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4216 killed at Tue Nov 27 18:05:48 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:05:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4263 >/dev/null 2>/dev/null
selfserv with PID 4263 found at Tue Nov 27 18:05:48 PST 2012
selfserv with PID 4263 started at Tue Nov 27 18:05:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8744: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4263 at Tue Nov 27 18:05:49 PST 2012
kill -USR1 4263
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4263 killed at Tue Nov 27 18:05:49 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4322 >/dev/null 2>/dev/null
selfserv with PID 4322 found at Tue Nov 27 18:05:49 PST 2012
selfserv with PID 4322 started at Tue Nov 27 18:05:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8745: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4322 at Tue Nov 27 18:05:49 PST 2012
kill -USR1 4322
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4322 killed at Tue Nov 27 18:05:49 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:49 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4369 >/dev/null 2>/dev/null
selfserv with PID 4369 found at Tue Nov 27 18:05:49 PST 2012
selfserv with PID 4369 started at Tue Nov 27 18:05:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8746: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4369 at Tue Nov 27 18:05:50 PST 2012
kill -USR1 4369
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4369 killed at Tue Nov 27 18:05:50 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:05:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4416 >/dev/null 2>/dev/null
selfserv with PID 4416 found at Tue Nov 27 18:05:50 PST 2012
selfserv with PID 4416 started at Tue Nov 27 18:05:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8747: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4416 at Tue Nov 27 18:05:50 PST 2012
kill -USR1 4416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4416 killed at Tue Nov 27 18:05:50 PST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/authin.tl.tmp
0
selfserv starting at Tue Nov 27 18:05:50 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:05:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:50 PST 2012
selfserv with PID 4470 started at Tue Nov 27 18:05:50 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:50 PST 2012
ssl.sh: #8748: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:51 PST 2012
ssl.sh: #8749: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:51 PST 2012
ssl.sh: #8750: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:51 PST 2012
ssl.sh: #8751: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:51 PST 2012
ssl.sh: #8752: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:52 PST 2012
ssl.sh: #8753: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:52 PST 2012
ssl.sh: #8754: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:52 PST 2012
ssl.sh: #8755: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:53 PST 2012
ssl.sh: #8756: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:53 PST 2012
ssl.sh: #8757: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:53 PST 2012
ssl.sh: #8758: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:53 PST 2012
ssl.sh: #8759: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:54 PST 2012
ssl.sh: #8760: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:54 PST 2012
================= CRL Reloaded =============
ssl.sh: #8761: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:54 PST 2012
ssl.sh: #8762: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:54 PST 2012
ssl.sh: #8763: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:55 PST 2012
ssl.sh: #8764: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:55 PST 2012
ssl.sh: #8765: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:55 PST 2012
ssl.sh: #8766: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:55 PST 2012
ssl.sh: #8767: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:56 PST 2012
ssl.sh: #8768: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:56 PST 2012
ssl.sh: #8769: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:56 PST 2012
ssl.sh: #8770: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:56 PST 2012
ssl.sh: #8771: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:57 PST 2012
ssl.sh: #8772: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:57 PST 2012
ssl.sh: #8773: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:57 PST 2012
ssl.sh: #8774: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:58 PST 2012
================= CRL Reloaded =============
ssl.sh: #8775: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:58 PST 2012
ssl.sh: #8776: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:58 PST 2012
ssl.sh: #8777: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:58 PST 2012
ssl.sh: #8778: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:59 PST 2012
ssl.sh: #8779: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:59 PST 2012
ssl.sh: #8780: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:59 PST 2012
ssl.sh: #8781: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:05:59 PST 2012
ssl.sh: #8782: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:06:00 PST 2012
ssl.sh: #8783: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:06:00 PST 2012
ssl.sh: #8784: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:06:00 PST 2012
ssl.sh: #8785: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:06:00 PST 2012
ssl.sh: #8786: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:06:01 PST 2012
ssl.sh: #8787: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4470 >/dev/null 2>/dev/null
selfserv with PID 4470 found at Tue Nov 27 18:06:01 PST 2012
ssl.sh: #8788: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4470 at Tue Nov 27 18:06:01 PST 2012
kill -USR1 4470
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 4470 killed at Tue Nov 27 18:06:01 PST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:06:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:02 PST 2012
selfserv with PID 5881 started at Tue Nov 27 18:06:02 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:02 PST 2012
ssl.sh: #8789: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:02 PST 2012
ssl.sh: #8790: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:02 PST 2012
ssl.sh: #8791: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:03 PST 2012
ssl.sh: #8792: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:03 PST 2012
ssl.sh: #8793: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:03 PST 2012
ssl.sh: #8794: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:03 PST 2012
ssl.sh: #8795: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:04 PST 2012
ssl.sh: #8796: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:04 PST 2012
ssl.sh: #8797: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:04 PST 2012
ssl.sh: #8798: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:04 PST 2012
ssl.sh: #8799: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:05 PST 2012
ssl.sh: #8800: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:05 PST 2012
ssl.sh: #8801: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:05 PST 2012
================= CRL Reloaded =============
ssl.sh: #8802: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:05 PST 2012
ssl.sh: #8803: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:06 PST 2012
ssl.sh: #8804: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:06 PST 2012
ssl.sh: #8805: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:06 PST 2012
ssl.sh: #8806: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:07 PST 2012
ssl.sh: #8807: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:07 PST 2012
ssl.sh: #8808: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:07 PST 2012
ssl.sh: #8809: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:07 PST 2012
ssl.sh: #8810: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:08 PST 2012
ssl.sh: #8811: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:08 PST 2012
ssl.sh: #8812: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:08 PST 2012
ssl.sh: #8813: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:08 PST 2012
ssl.sh: #8814: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:09 PST 2012
ssl.sh: #8815: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:09 PST 2012
================= CRL Reloaded =============
ssl.sh: #8816: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:09 PST 2012
ssl.sh: #8817: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:09 PST 2012
ssl.sh: #8818: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:10 PST 2012
ssl.sh: #8819: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:10 PST 2012
ssl.sh: #8820: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:10 PST 2012
ssl.sh: #8821: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:10 PST 2012
ssl.sh: #8822: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:11 PST 2012
ssl.sh: #8823: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:11 PST 2012
ssl.sh: #8824: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:11 PST 2012
ssl.sh: #8825: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:12 PST 2012
ssl.sh: #8826: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:12 PST 2012
ssl.sh: #8827: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:12 PST 2012
ssl.sh: #8828: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5881 >/dev/null 2>/dev/null
selfserv with PID 5881 found at Tue Nov 27 18:06:12 PST 2012
ssl.sh: #8829: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 5881 at Tue Nov 27 18:06:12 PST 2012
kill -USR1 5881
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 5881 killed at Tue Nov 27 18:06:12 PST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:06:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:12 PST 2012
selfserv with PID 7292 started at Tue Nov 27 18:06:12 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:13 PST 2012
ssl.sh: #8830: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:13 PST 2012
ssl.sh: #8831: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:13 PST 2012
ssl.sh: #8832: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:14 PST 2012
ssl.sh: #8833: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:14 PST 2012
ssl.sh: #8834: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:14 PST 2012
ssl.sh: #8835: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:15 PST 2012
ssl.sh: #8836: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:15 PST 2012
ssl.sh: #8837: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:15 PST 2012
ssl.sh: #8838: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:15 PST 2012
ssl.sh: #8839: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:16 PST 2012
ssl.sh: #8840: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:16 PST 2012
ssl.sh: #8841: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:16 PST 2012
ssl.sh: #8842: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:17 PST 2012
================= CRL Reloaded =============
ssl.sh: #8843: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:17 PST 2012
ssl.sh: #8844: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:17 PST 2012
ssl.sh: #8845: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:17 PST 2012
ssl.sh: #8846: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:18 PST 2012
ssl.sh: #8847: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:18 PST 2012
ssl.sh: #8848: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:18 PST 2012
ssl.sh: #8849: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:18 PST 2012
ssl.sh: #8850: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:19 PST 2012
ssl.sh: #8851: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:19 PST 2012
ssl.sh: #8852: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:19 PST 2012
ssl.sh: #8853: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:20 PST 2012
ssl.sh: #8854: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:20 PST 2012
ssl.sh: #8855: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:20 PST 2012
ssl.sh: #8856: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:20 PST 2012
================= CRL Reloaded =============
ssl.sh: #8857: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:21 PST 2012
ssl.sh: #8858: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:21 PST 2012
ssl.sh: #8859: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:21 PST 2012
ssl.sh: #8860: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:22 PST 2012
ssl.sh: #8861: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:22 PST 2012
ssl.sh: #8862: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:22 PST 2012
ssl.sh: #8863: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:22 PST 2012
ssl.sh: #8864: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:23 PST 2012
ssl.sh: #8865: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:23 PST 2012
ssl.sh: #8866: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:23 PST 2012
ssl.sh: #8867: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:24 PST 2012
ssl.sh: #8868: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:24 PST 2012
ssl.sh: #8869: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7292 >/dev/null 2>/dev/null
selfserv with PID 7292 found at Tue Nov 27 18:06:24 PST 2012
ssl.sh: #8870: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7292 at Tue Nov 27 18:06:24 PST 2012
kill -USR1 7292
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 7292 killed at Tue Nov 27 18:06:24 PST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:06:24 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:24 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:24 PST 2012
selfserv with PID 8705 started at Tue Nov 27 18:06:24 PST 2012
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:25 PST 2012
ssl.sh: #8871: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:25 PST 2012
ssl.sh: #8872: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:25 PST 2012
ssl.sh: #8873: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:25 PST 2012
ssl.sh: #8874: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:26 PST 2012
ssl.sh: #8875: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:26 PST 2012
ssl.sh: #8876: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:26 PST 2012
ssl.sh: #8877: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:27 PST 2012
ssl.sh: #8878: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:27 PST 2012
ssl.sh: #8879: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:27 PST 2012
ssl.sh: #8880: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:27 PST 2012
ssl.sh: #8881: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:28 PST 2012
ssl.sh: #8882: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:28 PST 2012
ssl.sh: #8883: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:28 PST 2012
================= CRL Reloaded =============
ssl.sh: #8884: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:29 PST 2012
ssl.sh: #8885: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:29 PST 2012
ssl.sh: #8886: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:29 PST 2012
ssl.sh: #8887: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:29 PST 2012
ssl.sh: #8888: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:30 PST 2012
ssl.sh: #8889: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:30 PST 2012
ssl.sh: #8890: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:30 PST 2012
ssl.sh: #8891: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:30 PST 2012
ssl.sh: #8892: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:31 PST 2012
ssl.sh: #8893: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:31 PST 2012
ssl.sh: #8894: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:31 PST 2012
ssl.sh: #8895: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:32 PST 2012
ssl.sh: #8896: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:32 PST 2012
ssl.sh: #8897: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:32 PST 2012
================= CRL Reloaded =============
ssl.sh: #8898: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:33 PST 2012
ssl.sh: #8899: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:33 PST 2012
ssl.sh: #8900: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:33 PST 2012
ssl.sh: #8901: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:34 PST 2012
ssl.sh: #8902: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:34 PST 2012
ssl.sh: #8903: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:34 PST 2012
ssl.sh: #8904: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:34 PST 2012
ssl.sh: #8905: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:35 PST 2012
ssl.sh: #8906: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:35 PST 2012
ssl.sh: #8907: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:35 PST 2012
ssl.sh: #8908: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:36 PST 2012
ssl.sh: #8909: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:36 PST 2012
ssl.sh: #8910: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8705 >/dev/null 2>/dev/null
selfserv with PID 8705 found at Tue Nov 27 18:06:36 PST 2012
ssl.sh: #8911: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8705 at Tue Nov 27 18:06:36 PST 2012
kill -USR1 8705
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 8705 killed at Tue Nov 27 18:06:36 PST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:06:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 10117 >/dev/null 2>/dev/null
selfserv with PID 10117 found at Tue Nov 27 18:06:36 PST 2012
selfserv with PID 10117 started at Tue Nov 27 18:06:36 PST 2012
trying to kill selfserv with PID 10117 at Tue Nov 27 18:06:36 PST 2012
kill -USR1 10117
./ssl.sh: line 173: 10117 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 10117 killed at Tue Nov 27 18:06:36 PST 2012
selfserv starting at Tue Nov 27 18:06:36 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:36 PST 2012
selfserv with PID 10150 started at Tue Nov 27 18:06:36 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:37 PST 2012
ssl.sh: #8912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:37 PST 2012
ssl.sh: #8913: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:37 PST 2012
ssl.sh: #8914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:37 PST 2012
ssl.sh: #8915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:38 PST 2012
ssl.sh: #8916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:38 PST 2012
ssl.sh: #8917: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:38 PST 2012
ssl.sh: #8918: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:39 PST 2012
ssl.sh: #8919: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:39 PST 2012
ssl.sh: #8920: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:39 PST 2012
ssl.sh: #8921: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:39 PST 2012
ssl.sh: #8922: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:40 PST 2012
ssl.sh: #8923: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:40 PST 2012
ssl.sh: #8924: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:40 PST 2012
================= CRL Reloaded =============
ssl.sh: #8925: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:40 PST 2012
ssl.sh: #8926: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:41 PST 2012
ssl.sh: #8927: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:41 PST 2012
ssl.sh: #8928: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:41 PST 2012
ssl.sh: #8929: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:41 PST 2012
ssl.sh: #8930: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:42 PST 2012
ssl.sh: #8931: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:42 PST 2012
ssl.sh: #8932: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:42 PST 2012
ssl.sh: #8933: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:43 PST 2012
ssl.sh: #8934: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:43 PST 2012
ssl.sh: #8935: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:43 PST 2012
ssl.sh: #8936: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:43 PST 2012
ssl.sh: #8937: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:44 PST 2012
ssl.sh: #8938: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:44 PST 2012
================= CRL Reloaded =============
ssl.sh: #8939: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:44 PST 2012
ssl.sh: #8940: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:44 PST 2012
ssl.sh: #8941: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:45 PST 2012
ssl.sh: #8942: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:45 PST 2012
ssl.sh: #8943: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:45 PST 2012
ssl.sh: #8944: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:46 PST 2012
ssl.sh: #8945: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:46 PST 2012
ssl.sh: #8946: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:46 PST 2012
ssl.sh: #8947: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:46 PST 2012
ssl.sh: #8948: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:47 PST 2012
ssl.sh: #8949: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:47 PST 2012
ssl.sh: #8950: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:47 PST 2012
ssl.sh: #8951: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10150 >/dev/null 2>/dev/null
selfserv with PID 10150 found at Tue Nov 27 18:06:47 PST 2012
ssl.sh: #8952: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10150 at Tue Nov 27 18:06:47 PST 2012
kill -USR1 10150
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 10150 killed at Tue Nov 27 18:06:47 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:06:48 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:48 PST 2012
selfserv with PID 11571 started at Tue Nov 27 18:06:48 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:48 PST 2012
ssl.sh: #8953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:48 PST 2012
ssl.sh: #8954: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:48 PST 2012
ssl.sh: #8955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:49 PST 2012
ssl.sh: #8956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:49 PST 2012
ssl.sh: #8957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:49 PST 2012
ssl.sh: #8958: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:49 PST 2012
ssl.sh: #8959: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:50 PST 2012
ssl.sh: #8960: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:50 PST 2012
ssl.sh: #8961: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:50 PST 2012
ssl.sh: #8962: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:51 PST 2012
ssl.sh: #8963: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:51 PST 2012
ssl.sh: #8964: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:51 PST 2012
ssl.sh: #8965: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:51 PST 2012
================= CRL Reloaded =============
ssl.sh: #8966: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:52 PST 2012
ssl.sh: #8967: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:52 PST 2012
ssl.sh: #8968: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:52 PST 2012
ssl.sh: #8969: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:52 PST 2012
ssl.sh: #8970: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:53 PST 2012
ssl.sh: #8971: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:53 PST 2012
ssl.sh: #8972: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:53 PST 2012
ssl.sh: #8973: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:53 PST 2012
ssl.sh: #8974: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:54 PST 2012
ssl.sh: #8975: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:54 PST 2012
ssl.sh: #8976: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:54 PST 2012
ssl.sh: #8977: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:55 PST 2012
ssl.sh: #8978: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:55 PST 2012
ssl.sh: #8979: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:55 PST 2012
================= CRL Reloaded =============
ssl.sh: #8980: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:55 PST 2012
ssl.sh: #8981: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:56 PST 2012
ssl.sh: #8982: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:56 PST 2012
ssl.sh: #8983: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:56 PST 2012
ssl.sh: #8984: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:56 PST 2012
ssl.sh: #8985: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:57 PST 2012
ssl.sh: #8986: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:57 PST 2012
ssl.sh: #8987: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:57 PST 2012
ssl.sh: #8988: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:57 PST 2012
ssl.sh: #8989: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:58 PST 2012
ssl.sh: #8990: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:58 PST 2012
ssl.sh: #8991: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:58 PST 2012
ssl.sh: #8992: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11571 >/dev/null 2>/dev/null
selfserv with PID 11571 found at Tue Nov 27 18:06:59 PST 2012
ssl.sh: #8993: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11571 at Tue Nov 27 18:06:59 PST 2012
kill -USR1 11571
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 11571 killed at Tue Nov 27 18:06:59 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:06:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:06:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:06:59 PST 2012
selfserv with PID 12982 started at Tue Nov 27 18:06:59 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:06:59 PST 2012
ssl.sh: #8994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:06:59 PST 2012
ssl.sh: #8995: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:00 PST 2012
ssl.sh: #8996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:00 PST 2012
ssl.sh: #8997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:00 PST 2012
ssl.sh: #8998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:00 PST 2012
ssl.sh: #8999: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:01 PST 2012
ssl.sh: #9000: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:01 PST 2012
ssl.sh: #9001: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:01 PST 2012
ssl.sh: #9002: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:01 PST 2012
ssl.sh: #9003: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:02 PST 2012
ssl.sh: #9004: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:02 PST 2012
ssl.sh: #9005: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:03 PST 2012
ssl.sh: #9006: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:03 PST 2012
================= CRL Reloaded =============
ssl.sh: #9007: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:03 PST 2012
ssl.sh: #9008: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:03 PST 2012
ssl.sh: #9009: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:04 PST 2012
ssl.sh: #9010: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:04 PST 2012
ssl.sh: #9011: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:04 PST 2012
ssl.sh: #9012: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:04 PST 2012
ssl.sh: #9013: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:05 PST 2012
ssl.sh: #9014: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:05 PST 2012
ssl.sh: #9015: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:05 PST 2012
ssl.sh: #9016: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:05 PST 2012
ssl.sh: #9017: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:06 PST 2012
ssl.sh: #9018: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:06 PST 2012
ssl.sh: #9019: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:06 PST 2012
ssl.sh: #9020: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:07 PST 2012
================= CRL Reloaded =============
ssl.sh: #9021: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:07 PST 2012
ssl.sh: #9022: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:07 PST 2012
ssl.sh: #9023: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:07 PST 2012
ssl.sh: #9024: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:08 PST 2012
ssl.sh: #9025: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:08 PST 2012
ssl.sh: #9026: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:08 PST 2012
ssl.sh: #9027: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:08 PST 2012
ssl.sh: #9028: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:09 PST 2012
ssl.sh: #9029: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:09 PST 2012
ssl.sh: #9030: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:09 PST 2012
ssl.sh: #9031: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:09 PST 2012
ssl.sh: #9032: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:10 PST 2012
ssl.sh: #9033: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12982 >/dev/null 2>/dev/null
selfserv with PID 12982 found at Tue Nov 27 18:07:10 PST 2012
ssl.sh: #9034: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12982 at Tue Nov 27 18:07:10 PST 2012
kill -USR1 12982
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 12982 killed at Tue Nov 27 18:07:10 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:07:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:07:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:10 PST 2012
selfserv with PID 14393 started at Tue Nov 27 18:07:10 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:11 PST 2012
ssl.sh: #9035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:11 PST 2012
ssl.sh: #9036: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:11 PST 2012
ssl.sh: #9037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:11 PST 2012
ssl.sh: #9038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:12 PST 2012
ssl.sh: #9039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:12 PST 2012
ssl.sh: #9040: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:12 PST 2012
ssl.sh: #9041: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:13 PST 2012
ssl.sh: #9042: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:13 PST 2012
ssl.sh: #9043: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:13 PST 2012
ssl.sh: #9044: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:13 PST 2012
ssl.sh: #9045: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:14 PST 2012
ssl.sh: #9046: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:14 PST 2012
ssl.sh: #9047: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:14 PST 2012
================= CRL Reloaded =============
ssl.sh: #9048: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:15 PST 2012
ssl.sh: #9049: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:15 PST 2012
ssl.sh: #9050: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:15 PST 2012
ssl.sh: #9051: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:15 PST 2012
ssl.sh: #9052: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:16 PST 2012
ssl.sh: #9053: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:16 PST 2012
ssl.sh: #9054: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:16 PST 2012
ssl.sh: #9055: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:17 PST 2012
ssl.sh: #9056: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:17 PST 2012
ssl.sh: #9057: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:17 PST 2012
ssl.sh: #9058: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:17 PST 2012
ssl.sh: #9059: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:18 PST 2012
ssl.sh: #9060: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:18 PST 2012
ssl.sh: #9061: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:18 PST 2012
================= CRL Reloaded =============
ssl.sh: #9062: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:19 PST 2012
ssl.sh: #9063: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:19 PST 2012
ssl.sh: #9064: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:19 PST 2012
ssl.sh: #9065: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:19 PST 2012
ssl.sh: #9066: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:20 PST 2012
ssl.sh: #9067: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:20 PST 2012
ssl.sh: #9068: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:20 PST 2012
ssl.sh: #9069: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:21 PST 2012
ssl.sh: #9070: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:21 PST 2012
ssl.sh: #9071: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:21 PST 2012
ssl.sh: #9072: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:21 PST 2012
ssl.sh: #9073: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:22 PST 2012
ssl.sh: #9074: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14393 >/dev/null 2>/dev/null
selfserv with PID 14393 found at Tue Nov 27 18:07:22 PST 2012
ssl.sh: #9075: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14393 at Tue Nov 27 18:07:22 PST 2012
kill -USR1 14393
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 14393 killed at Tue Nov 27 18:07:22 PST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:07:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:07:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:22 PST 2012
selfserv with PID 15806 started at Tue Nov 27 18:07:22 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:23 PST 2012
ssl.sh: #9076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:23 PST 2012
ssl.sh: #9077: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:23 PST 2012
ssl.sh: #9078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:23 PST 2012
ssl.sh: #9079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:24 PST 2012
ssl.sh: #9080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:24 PST 2012
ssl.sh: #9081: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:24 PST 2012
ssl.sh: #9082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:25 PST 2012
ssl.sh: #9083: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:25 PST 2012
ssl.sh: #9084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:25 PST 2012
ssl.sh: #9085: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:25 PST 2012
ssl.sh: #9086: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:26 PST 2012
ssl.sh: #9087: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:26 PST 2012
ssl.sh: #9088: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:26 PST 2012
================= CRL Reloaded =============
ssl.sh: #9089: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:27 PST 2012
ssl.sh: #9090: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:27 PST 2012
ssl.sh: #9091: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:27 PST 2012
ssl.sh: #9092: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:27 PST 2012
ssl.sh: #9093: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:28 PST 2012
ssl.sh: #9094: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:28 PST 2012
ssl.sh: #9095: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:28 PST 2012
ssl.sh: #9096: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:29 PST 2012
ssl.sh: #9097: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:29 PST 2012
ssl.sh: #9098: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:29 PST 2012
ssl.sh: #9099: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:29 PST 2012
ssl.sh: #9100: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:30 PST 2012
ssl.sh: #9101: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:30 PST 2012
ssl.sh: #9102: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:30 PST 2012
================= CRL Reloaded =============
ssl.sh: #9103: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:31 PST 2012
ssl.sh: #9104: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:31 PST 2012
ssl.sh: #9105: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:31 PST 2012
ssl.sh: #9106: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:31 PST 2012
ssl.sh: #9107: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:32 PST 2012
ssl.sh: #9108: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:32 PST 2012
ssl.sh: #9109: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:32 PST 2012
ssl.sh: #9110: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:33 PST 2012
ssl.sh: #9111: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:33 PST 2012
ssl.sh: #9112: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:34 PST 2012
ssl.sh: #9113: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:34 PST 2012
ssl.sh: #9114: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:34 PST 2012
ssl.sh: #9115: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15806 >/dev/null 2>/dev/null
selfserv with PID 15806 found at Tue Nov 27 18:07:34 PST 2012
ssl.sh: #9116: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15806 at Tue Nov 27 18:07:34 PST 2012
kill -USR1 15806
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 15806 killed at Tue Nov 27 18:07:34 PST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:07:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:07:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:35 PST 2012
selfserv with PID 17217 started at Tue Nov 27 18:07:35 PST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:35 PST 2012
ssl.sh: #9117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:35 PST 2012
ssl.sh: #9118: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:35 PST 2012
ssl.sh: #9119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:36 PST 2012
ssl.sh: #9120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:36 PST 2012
ssl.sh: #9121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:36 PST 2012
ssl.sh: #9122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:37 PST 2012
ssl.sh: #9123: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:37 PST 2012
ssl.sh: #9124: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:37 PST 2012
ssl.sh: #9125: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:37 PST 2012
ssl.sh: #9126: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:38 PST 2012
ssl.sh: #9127: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:38 PST 2012
ssl.sh: #9128: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:38 PST 2012
ssl.sh: #9129: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:39 PST 2012
================= CRL Reloaded =============
ssl.sh: #9130: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:39 PST 2012
ssl.sh: #9131: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:39 PST 2012
ssl.sh: #9132: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:39 PST 2012
ssl.sh: #9133: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:40 PST 2012
ssl.sh: #9134: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:40 PST 2012
ssl.sh: #9135: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:40 PST 2012
ssl.sh: #9136: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:41 PST 2012
ssl.sh: #9137: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:41 PST 2012
ssl.sh: #9138: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:41 PST 2012
ssl.sh: #9139: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:41 PST 2012
ssl.sh: #9140: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:42 PST 2012
ssl.sh: #9141: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:42 PST 2012
ssl.sh: #9142: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:42 PST 2012
ssl.sh: #9143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:43 PST 2012
================= CRL Reloaded =============
ssl.sh: #9144: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:43 PST 2012
ssl.sh: #9145: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:43 PST 2012
ssl.sh: #9146: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:43 PST 2012
ssl.sh: #9147: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:44 PST 2012
ssl.sh: #9148: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:44 PST 2012
ssl.sh: #9149: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:44 PST 2012
ssl.sh: #9150: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:45 PST 2012
ssl.sh: #9151: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:45 PST 2012
ssl.sh: #9152: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:45 PST 2012
ssl.sh: #9153: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:45 PST 2012
ssl.sh: #9154: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:46 PST 2012
ssl.sh: #9155: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:46 PST 2012
ssl.sh: #9156: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17217 >/dev/null 2>/dev/null
selfserv with PID 17217 found at Tue Nov 27 18:07:46 PST 2012
ssl.sh: #9157: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17217 at Tue Nov 27 18:07:46 PST 2012
kill -USR1 17217
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 17217 killed at Tue Nov 27 18:07:46 PST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:07:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:07:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18638 >/dev/null 2>/dev/null
selfserv with PID 18638 found at Tue Nov 27 18:07:47 PST 2012
selfserv with PID 18638 started at Tue Nov 27 18:07:47 PST 2012
trying to kill selfserv with PID 18638 at Tue Nov 27 18:07:47 PST 2012
kill -USR1 18638
./ssl.sh: line 173: 18638 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 18638 killed at Tue Nov 27 18:07:47 PST 2012
selfserv starting at Tue Nov 27 18:07:47 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:07:47 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:47 PST 2012
selfserv with PID 18671 started at Tue Nov 27 18:07:47 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:47 PST 2012
ssl.sh: #9158: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:47 PST 2012
ssl.sh: #9159: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:47 PST 2012
ssl.sh: #9160: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:48 PST 2012
ssl.sh: #9161: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:48 PST 2012
ssl.sh: #9162: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:48 PST 2012
ssl.sh: #9163: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:49 PST 2012
ssl.sh: #9164: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:49 PST 2012
ssl.sh: #9165: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:49 PST 2012
ssl.sh: #9166: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:49 PST 2012
ssl.sh: #9167: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:50 PST 2012
ssl.sh: #9168: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:50 PST 2012
ssl.sh: #9169: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:50 PST 2012
ssl.sh: #9170: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:50 PST 2012
================= CRL Reloaded =============
ssl.sh: #9171: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:51 PST 2012
ssl.sh: #9172: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:51 PST 2012
ssl.sh: #9173: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:51 PST 2012
ssl.sh: #9174: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:51 PST 2012
ssl.sh: #9175: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:52 PST 2012
ssl.sh: #9176: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:52 PST 2012
ssl.sh: #9177: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:52 PST 2012
ssl.sh: #9178: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:53 PST 2012
ssl.sh: #9179: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:53 PST 2012
ssl.sh: #9180: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:53 PST 2012
ssl.sh: #9181: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:53 PST 2012
ssl.sh: #9182: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:54 PST 2012
ssl.sh: #9183: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:54 PST 2012
ssl.sh: #9184: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:54 PST 2012
================= CRL Reloaded =============
ssl.sh: #9185: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:54 PST 2012
ssl.sh: #9186: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:55 PST 2012
ssl.sh: #9187: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:55 PST 2012
ssl.sh: #9188: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:55 PST 2012
ssl.sh: #9189: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:55 PST 2012
ssl.sh: #9190: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:56 PST 2012
ssl.sh: #9191: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:56 PST 2012
ssl.sh: #9192: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:56 PST 2012
ssl.sh: #9193: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:56 PST 2012
ssl.sh: #9194: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:57 PST 2012
ssl.sh: #9195: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:57 PST 2012
ssl.sh: #9196: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:57 PST 2012
ssl.sh: #9197: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18671 >/dev/null 2>/dev/null
selfserv with PID 18671 found at Tue Nov 27 18:07:58 PST 2012
ssl.sh: #9198: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18671 at Tue Nov 27 18:07:58 PST 2012
kill -USR1 18671
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 18671 killed at Tue Nov 27 18:07:58 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:07:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:07:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:58 PST 2012
selfserv with PID 20082 started at Tue Nov 27 18:07:58 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:58 PST 2012
ssl.sh: #9199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:58 PST 2012
ssl.sh: #9200: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:59 PST 2012
ssl.sh: #9201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:59 PST 2012
ssl.sh: #9202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:59 PST 2012
ssl.sh: #9203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:07:59 PST 2012
ssl.sh: #9204: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:00 PST 2012
ssl.sh: #9205: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:00 PST 2012
ssl.sh: #9206: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:00 PST 2012
ssl.sh: #9207: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:00 PST 2012
ssl.sh: #9208: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:01 PST 2012
ssl.sh: #9209: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:01 PST 2012
ssl.sh: #9210: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:01 PST 2012
ssl.sh: #9211: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:02 PST 2012
================= CRL Reloaded =============
ssl.sh: #9212: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:02 PST 2012
ssl.sh: #9213: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:02 PST 2012
ssl.sh: #9214: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:02 PST 2012
ssl.sh: #9215: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:03 PST 2012
ssl.sh: #9216: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:03 PST 2012
ssl.sh: #9217: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:04 PST 2012
ssl.sh: #9218: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:04 PST 2012
ssl.sh: #9219: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:04 PST 2012
ssl.sh: #9220: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:04 PST 2012
ssl.sh: #9221: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:05 PST 2012
ssl.sh: #9222: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:05 PST 2012
ssl.sh: #9223: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:05 PST 2012
ssl.sh: #9224: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:05 PST 2012
ssl.sh: #9225: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:06 PST 2012
================= CRL Reloaded =============
ssl.sh: #9226: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:06 PST 2012
ssl.sh: #9227: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:06 PST 2012
ssl.sh: #9228: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:06 PST 2012
ssl.sh: #9229: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:07 PST 2012
ssl.sh: #9230: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:07 PST 2012
ssl.sh: #9231: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:07 PST 2012
ssl.sh: #9232: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:08 PST 2012
ssl.sh: #9233: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:08 PST 2012
ssl.sh: #9234: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:08 PST 2012
ssl.sh: #9235: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:08 PST 2012
ssl.sh: #9236: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:09 PST 2012
ssl.sh: #9237: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:09 PST 2012
ssl.sh: #9238: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Tue Nov 27 18:08:09 PST 2012
ssl.sh: #9239: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20082 at Tue Nov 27 18:08:09 PST 2012
kill -USR1 20082
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 20082 killed at Tue Nov 27 18:08:09 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:08:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:09 PST 2012
selfserv with PID 21493 started at Tue Nov 27 18:08:09 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:10 PST 2012
ssl.sh: #9240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:10 PST 2012
ssl.sh: #9241: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:10 PST 2012
ssl.sh: #9242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:10 PST 2012
ssl.sh: #9243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:11 PST 2012
ssl.sh: #9244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:11 PST 2012
ssl.sh: #9245: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:11 PST 2012
ssl.sh: #9246: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:11 PST 2012
ssl.sh: #9247: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:12 PST 2012
ssl.sh: #9248: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:12 PST 2012
ssl.sh: #9249: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:12 PST 2012
ssl.sh: #9250: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:13 PST 2012
ssl.sh: #9251: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:13 PST 2012
ssl.sh: #9252: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:13 PST 2012
================= CRL Reloaded =============
ssl.sh: #9253: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:13 PST 2012
ssl.sh: #9254: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:14 PST 2012
ssl.sh: #9255: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:14 PST 2012
ssl.sh: #9256: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:14 PST 2012
ssl.sh: #9257: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:14 PST 2012
ssl.sh: #9258: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:15 PST 2012
ssl.sh: #9259: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:15 PST 2012
ssl.sh: #9260: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:15 PST 2012
ssl.sh: #9261: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:15 PST 2012
ssl.sh: #9262: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:16 PST 2012
ssl.sh: #9263: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:16 PST 2012
ssl.sh: #9264: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:16 PST 2012
ssl.sh: #9265: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:17 PST 2012
ssl.sh: #9266: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 172 bytes
tstclnt: Writing 172 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:17 PST 2012
================= CRL Reloaded =============
ssl.sh: #9267: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:17 PST 2012
ssl.sh: #9268: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:17 PST 2012
ssl.sh: #9269: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:18 PST 2012
ssl.sh: #9270: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:18 PST 2012
ssl.sh: #9271: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:18 PST 2012
ssl.sh: #9272: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:18 PST 2012
ssl.sh: #9273: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:19 PST 2012
ssl.sh: #9274: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:19 PST 2012
ssl.sh: #9275: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:19 PST 2012
ssl.sh: #9276: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:19 PST 2012
ssl.sh: #9277: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:20 PST 2012
ssl.sh: #9278: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:20 PST 2012
ssl.sh: #9279: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21493 >/dev/null 2>/dev/null
selfserv with PID 21493 found at Tue Nov 27 18:08:20 PST 2012
ssl.sh: #9280: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21493 at Tue Nov 27 18:08:20 PST 2012
kill -USR1 21493
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 21493 killed at Tue Nov 27 18:08:20 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:08:20 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:20 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:20 PST 2012
selfserv with PID 22910 started at Tue Nov 27 18:08:20 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:21 PST 2012
ssl.sh: #9281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:21 PST 2012
ssl.sh: #9282: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:21 PST 2012
ssl.sh: #9283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:22 PST 2012
ssl.sh: #9284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:22 PST 2012
ssl.sh: #9285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:22 PST 2012
ssl.sh: #9286: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:22 PST 2012
ssl.sh: #9287: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:23 PST 2012
ssl.sh: #9288: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:23 PST 2012
ssl.sh: #9289: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:23 PST 2012
ssl.sh: #9290: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:24 PST 2012
ssl.sh: #9291: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:24 PST 2012
ssl.sh: #9292: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:24 PST 2012
ssl.sh: #9293: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:25 PST 2012
================= CRL Reloaded =============
ssl.sh: #9294: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:25 PST 2012
ssl.sh: #9295: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:25 PST 2012
ssl.sh: #9296: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:25 PST 2012
ssl.sh: #9297: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:26 PST 2012
ssl.sh: #9298: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:26 PST 2012
ssl.sh: #9299: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:26 PST 2012
ssl.sh: #9300: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:26 PST 2012
ssl.sh: #9301: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:27 PST 2012
ssl.sh: #9302: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:27 PST 2012
ssl.sh: #9303: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:27 PST 2012
ssl.sh: #9304: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:28 PST 2012
ssl.sh: #9305: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:28 PST 2012
ssl.sh: #9306: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:28 PST 2012
ssl.sh: #9307: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:28 PST 2012
================= CRL Reloaded =============
ssl.sh: #9308: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:29 PST 2012
ssl.sh: #9309: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:29 PST 2012
ssl.sh: #9310: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:29 PST 2012
ssl.sh: #9311: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:30 PST 2012
ssl.sh: #9312: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:30 PST 2012
ssl.sh: #9313: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:30 PST 2012
ssl.sh: #9314: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:30 PST 2012
ssl.sh: #9315: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:31 PST 2012
ssl.sh: #9316: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:31 PST 2012
ssl.sh: #9317: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:31 PST 2012
ssl.sh: #9318: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:32 PST 2012
ssl.sh: #9319: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:32 PST 2012
ssl.sh: #9320: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22910 >/dev/null 2>/dev/null
selfserv with PID 22910 found at Tue Nov 27 18:08:32 PST 2012
ssl.sh: #9321: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22910 at Tue Nov 27 18:08:32 PST 2012
kill -USR1 22910
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 22910 killed at Tue Nov 27 18:08:32 PST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:08:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:32 PST 2012
selfserv with PID 24321 started at Tue Nov 27 18:08:32 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:33 PST 2012
ssl.sh: #9322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:33 PST 2012
ssl.sh: #9323: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:33 PST 2012
ssl.sh: #9324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:34 PST 2012
ssl.sh: #9325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:34 PST 2012
ssl.sh: #9326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:34 PST 2012
ssl.sh: #9327: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:35 PST 2012
ssl.sh: #9328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:35 PST 2012
ssl.sh: #9329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:35 PST 2012
ssl.sh: #9330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:36 PST 2012
ssl.sh: #9331: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:37 PST 2012
ssl.sh: #9332: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:37 PST 2012
ssl.sh: #9333: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:38 PST 2012
ssl.sh: #9334: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:38 PST 2012
================= CRL Reloaded =============
ssl.sh: #9335: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:38 PST 2012
ssl.sh: #9336: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:38 PST 2012
ssl.sh: #9337: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:39 PST 2012
ssl.sh: #9338: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:39 PST 2012
ssl.sh: #9339: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:39 PST 2012
ssl.sh: #9340: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:40 PST 2012
ssl.sh: #9341: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:40 PST 2012
ssl.sh: #9342: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:40 PST 2012
ssl.sh: #9343: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:40 PST 2012
ssl.sh: #9344: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:41 PST 2012
ssl.sh: #9345: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:41 PST 2012
ssl.sh: #9346: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:41 PST 2012
ssl.sh: #9347: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:42 PST 2012
ssl.sh: #9348: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:42 PST 2012
================= CRL Reloaded =============
ssl.sh: #9349: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:42 PST 2012
ssl.sh: #9350: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:42 PST 2012
ssl.sh: #9351: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:43 PST 2012
ssl.sh: #9352: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:43 PST 2012
ssl.sh: #9353: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:43 PST 2012
ssl.sh: #9354: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:44 PST 2012
ssl.sh: #9355: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:44 PST 2012
ssl.sh: #9356: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:44 PST 2012
ssl.sh: #9357: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:44 PST 2012
ssl.sh: #9358: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:45 PST 2012
ssl.sh: #9359: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:45 PST 2012
ssl.sh: #9360: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:45 PST 2012
ssl.sh: #9361: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24321 >/dev/null 2>/dev/null
selfserv with PID 24321 found at Tue Nov 27 18:08:46 PST 2012
ssl.sh: #9362: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24321 at Tue Nov 27 18:08:46 PST 2012
kill -USR1 24321
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 24321 killed at Tue Nov 27 18:08:46 PST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:08:46 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:46 PST 2012
selfserv with PID 25742 started at Tue Nov 27 18:08:46 PST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:46 PST 2012
ssl.sh: #9363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:46 PST 2012
ssl.sh: #9364: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:47 PST 2012
ssl.sh: #9365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:47 PST 2012
ssl.sh: #9366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:47 PST 2012
ssl.sh: #9367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:47 PST 2012
ssl.sh: #9368: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:48 PST 2012
ssl.sh: #9369: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:48 PST 2012
ssl.sh: #9370: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:48 PST 2012
ssl.sh: #9371: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:49 PST 2012
ssl.sh: #9372: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:49 PST 2012
ssl.sh: #9373: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:49 PST 2012
ssl.sh: #9374: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:50 PST 2012
ssl.sh: #9375: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:50 PST 2012
================= CRL Reloaded =============
ssl.sh: #9376: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:50 PST 2012
ssl.sh: #9377: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:50 PST 2012
ssl.sh: #9378: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:51 PST 2012
ssl.sh: #9379: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:51 PST 2012
ssl.sh: #9380: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:51 PST 2012
ssl.sh: #9381: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:51 PST 2012
ssl.sh: #9382: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:52 PST 2012
ssl.sh: #9383: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:52 PST 2012
ssl.sh: #9384: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:52 PST 2012
ssl.sh: #9385: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:53 PST 2012
ssl.sh: #9386: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:53 PST 2012
ssl.sh: #9387: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:53 PST 2012
ssl.sh: #9388: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:53 PST 2012
ssl.sh: #9389: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 175 bytes
tstclnt: Writing 175 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:54 PST 2012
================= CRL Reloaded =============
ssl.sh: #9390: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:54 PST 2012
ssl.sh: #9391: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:54 PST 2012
ssl.sh: #9392: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:55 PST 2012
ssl.sh: #9393: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:55 PST 2012
ssl.sh: #9394: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:55 PST 2012
ssl.sh: #9395: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:55 PST 2012
ssl.sh: #9396: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:56 PST 2012
ssl.sh: #9397: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:56 PST 2012
ssl.sh: #9398: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:56 PST 2012
ssl.sh: #9399: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:57 PST 2012
ssl.sh: #9400: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:57 PST 2012
ssl.sh: #9401: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:57 PST 2012
ssl.sh: #9402: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=nss-vm-darwin9-1.community.scl3.mozilla.com,E=nss-vm-darwin9-1.community.scl3.mozilla.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25742 >/dev/null 2>/dev/null
selfserv with PID 25742 found at Tue Nov 27 18:08:57 PST 2012
ssl.sh: #9403: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25742 at Tue Nov 27 18:08:57 PST 2012
kill -USR1 25742
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 25742 killed at Tue Nov 27 18:08:57 PST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:08:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com  \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com  -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27153 >/dev/null 2>/dev/null
selfserv with PID 27153 found at Tue Nov 27 18:08:58 PST 2012
selfserv with PID 27153 started at Tue Nov 27 18:08:58 PST 2012
trying to kill selfserv with PID 27153 at Tue Nov 27 18:08:58 PST 2012
kill -USR1 27153
./ssl.sh: line 173: 27153 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv with PID 27153 killed at Tue Nov 27 18:08:58 PST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:08:58 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:58 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27275 >/dev/null 2>/dev/null
selfserv with PID 27275 found at Tue Nov 27 18:08:58 PST 2012
selfserv with PID 27275 started at Tue Nov 27 18:08:58 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:08:58 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 18:08:59 PST 2012
ssl.sh: #9404: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27275 at Tue Nov 27 18:08:59 PST 2012
kill -USR1 27275
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27275 killed at Tue Nov 27 18:08:59 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:08:59 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:08:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27333 >/dev/null 2>/dev/null
selfserv with PID 27333 found at Tue Nov 27 18:08:59 PST 2012
selfserv with PID 27333 started at Tue Nov 27 18:08:59 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:08:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:00 PST 2012
ssl.sh: #9405: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27333 at Tue Nov 27 18:09:00 PST 2012
kill -USR1 27333
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27333 killed at Tue Nov 27 18:09:00 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:09:00 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27391 >/dev/null 2>/dev/null
selfserv with PID 27391 found at Tue Nov 27 18:09:00 PST 2012
selfserv with PID 27391 started at Tue Nov 27 18:09:00 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:00 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:01 PST 2012
ssl.sh: #9406: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27391 at Tue Nov 27 18:09:01 PST 2012
kill -USR1 27391
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27391 killed at Tue Nov 27 18:09:01 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:09:01 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:01 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27449 >/dev/null 2>/dev/null
selfserv with PID 27449 found at Tue Nov 27 18:09:01 PST 2012
selfserv with PID 27449 started at Tue Nov 27 18:09:01 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:02 PST 2012
ssl.sh: #9407: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27449 at Tue Nov 27 18:09:02 PST 2012
kill -USR1 27449
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27449 killed at Tue Nov 27 18:09:02 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:09:02 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27507 >/dev/null 2>/dev/null
selfserv with PID 27507 found at Tue Nov 27 18:09:02 PST 2012
selfserv with PID 27507 started at Tue Nov 27 18:09:02 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:03 PST 2012
ssl.sh: #9408: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27507 at Tue Nov 27 18:09:03 PST 2012
kill -USR1 27507
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27507 killed at Tue Nov 27 18:09:03 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:09:03 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27565 >/dev/null 2>/dev/null
selfserv with PID 27565 found at Tue Nov 27 18:09:03 PST 2012
selfserv with PID 27565 started at Tue Nov 27 18:09:03 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:05 PST 2012
ssl.sh: #9409: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27565 at Tue Nov 27 18:09:05 PST 2012
kill -USR1 27565
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27565 killed at Tue Nov 27 18:09:05 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:09:05 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27623 >/dev/null 2>/dev/null
selfserv with PID 27623 found at Tue Nov 27 18:09:05 PST 2012
selfserv with PID 27623 started at Tue Nov 27 18:09:05 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:05 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:06 PST 2012
ssl.sh: #9410: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27623 at Tue Nov 27 18:09:06 PST 2012
kill -USR1 27623
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27623 killed at Tue Nov 27 18:09:06 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:09:06 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27681 >/dev/null 2>/dev/null
selfserv with PID 27681 found at Tue Nov 27 18:09:06 PST 2012
selfserv with PID 27681 started at Tue Nov 27 18:09:06 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:07 PST 2012
ssl.sh: #9411: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27681 at Tue Nov 27 18:09:07 PST 2012
kill -USR1 27681
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27681 killed at Tue Nov 27 18:09:07 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 18:09:08 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27745 >/dev/null 2>/dev/null
selfserv with PID 27745 found at Tue Nov 27 18:09:08 PST 2012
selfserv with PID 27745 started at Tue Nov 27 18:09:08 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:08 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:09 PST 2012
ssl.sh: #9412: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27745 at Tue Nov 27 18:09:09 PST 2012
kill -USR1 27745
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27745 killed at Tue Nov 27 18:09:09 PST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:09 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:09 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27824 >/dev/null 2>/dev/null
selfserv with PID 27824 found at Tue Nov 27 18:09:09 PST 2012
selfserv with PID 27824 started at Tue Nov 27 18:09:09 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:09 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:10 PST 2012
ssl.sh: #9413: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27824 at Tue Nov 27 18:09:10 PST 2012
kill -USR1 27824
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27824 killed at Tue Nov 27 18:09:10 PST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:10 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:10 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27882 >/dev/null 2>/dev/null
selfserv with PID 27882 found at Tue Nov 27 18:09:10 PST 2012
selfserv with PID 27882 started at Tue Nov 27 18:09:10 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:10 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:11 PST 2012
ssl.sh: #9414: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27882 at Tue Nov 27 18:09:11 PST 2012
kill -USR1 27882
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27882 killed at Tue Nov 27 18:09:11 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:11 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:11 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27940 >/dev/null 2>/dev/null
selfserv with PID 27940 found at Tue Nov 27 18:09:11 PST 2012
selfserv with PID 27940 started at Tue Nov 27 18:09:11 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:11 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:12 PST 2012
ssl.sh: #9415: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27940 at Tue Nov 27 18:09:12 PST 2012
kill -USR1 27940
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27940 killed at Tue Nov 27 18:09:12 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:09:12 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:12 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 27998 >/dev/null 2>/dev/null
selfserv with PID 27998 found at Tue Nov 27 18:09:12 PST 2012
selfserv with PID 27998 started at Tue Nov 27 18:09:12 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:12 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:13 PST 2012
ssl.sh: #9416: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27998 at Tue Nov 27 18:09:13 PST 2012
kill -USR1 27998
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 27998 killed at Tue Nov 27 18:09:13 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:09:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28056 >/dev/null 2>/dev/null
selfserv with PID 28056 found at Tue Nov 27 18:09:13 PST 2012
selfserv with PID 28056 started at Tue Nov 27 18:09:13 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:13 PST 2012
ssl.sh: #9417: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28056 at Tue Nov 27 18:09:13 PST 2012
kill -USR1 28056
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28056 killed at Tue Nov 27 18:09:13 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:09:13 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:13 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28114 >/dev/null 2>/dev/null
selfserv with PID 28114 found at Tue Nov 27 18:09:13 PST 2012
selfserv with PID 28114 started at Tue Nov 27 18:09:13 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:13 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:14 PST 2012
ssl.sh: #9418: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28114 at Tue Nov 27 18:09:14 PST 2012
kill -USR1 28114
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28114 killed at Tue Nov 27 18:09:14 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:09:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28172 >/dev/null 2>/dev/null
selfserv with PID 28172 found at Tue Nov 27 18:09:14 PST 2012
selfserv with PID 28172 started at Tue Nov 27 18:09:14 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:14 PST 2012
ssl.sh: #9419: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28172 at Tue Nov 27 18:09:14 PST 2012
kill -USR1 28172
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28172 killed at Tue Nov 27 18:09:14 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:09:14 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:14 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28230 >/dev/null 2>/dev/null
selfserv with PID 28230 found at Tue Nov 27 18:09:14 PST 2012
selfserv with PID 28230 started at Tue Nov 27 18:09:14 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:14 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:15 PST 2012
ssl.sh: #9420: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28230 at Tue Nov 27 18:09:15 PST 2012
kill -USR1 28230
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28230 killed at Tue Nov 27 18:09:15 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 18:09:15 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:15 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28294 >/dev/null 2>/dev/null
selfserv with PID 28294 found at Tue Nov 27 18:09:15 PST 2012
selfserv with PID 28294 started at Tue Nov 27 18:09:15 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:15 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:17 PST 2012
ssl.sh: #9421: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28294 at Tue Nov 27 18:09:17 PST 2012
kill -USR1 28294
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28294 killed at Tue Nov 27 18:09:17 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 18:09:17 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com -k nss-vm-darwin9-1-sni.community.scl3.mozilla.com -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:17 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28360 >/dev/null 2>/dev/null
selfserv with PID 28360 found at Tue Nov 27 18:09:17 PST 2012
selfserv with PID 28360 started at Tue Nov 27 18:09:17 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a nss-vm-darwin9-1-sni.community.scl3.mozilla.com \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:17 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:19 PST 2012
ssl.sh: #9422: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28360 at Tue Nov 27 18:09:19 PST 2012
kill -USR1 28360
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28360 killed at Tue Nov 27 18:09:19 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:09:19 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:19 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28439 >/dev/null 2>/dev/null
selfserv with PID 28439 found at Tue Nov 27 18:09:19 PST 2012
selfserv with PID 28439 started at Tue Nov 27 18:09:19 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:19 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:22 PST 2012
ssl.sh: #9423: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28439 at Tue Nov 27 18:09:22 PST 2012
kill -USR1 28439
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28439 killed at Tue Nov 27 18:09:22 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:09:22 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:22 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28497 >/dev/null 2>/dev/null
selfserv with PID 28497 found at Tue Nov 27 18:09:22 PST 2012
selfserv with PID 28497 started at Tue Nov 27 18:09:22 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:22 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:23 PST 2012
ssl.sh: #9424: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28497 at Tue Nov 27 18:09:23 PST 2012
kill -USR1 28497
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28497 killed at Tue Nov 27 18:09:23 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:09:23 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:23 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28555 >/dev/null 2>/dev/null
selfserv with PID 28555 found at Tue Nov 27 18:09:23 PST 2012
selfserv with PID 28555 started at Tue Nov 27 18:09:23 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:23 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:25 PST 2012
ssl.sh: #9425: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28555 at Tue Nov 27 18:09:26 PST 2012
kill -USR1 28555
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28555 killed at Tue Nov 27 18:09:26 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:09:26 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:26 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28613 >/dev/null 2>/dev/null
selfserv with PID 28613 found at Tue Nov 27 18:09:26 PST 2012
selfserv with PID 28613 started at Tue Nov 27 18:09:26 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:26 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:27 PST 2012
ssl.sh: #9426: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28613 at Tue Nov 27 18:09:27 PST 2012
kill -USR1 28613
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28613 killed at Tue Nov 27 18:09:27 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:09:28 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:28 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28671 >/dev/null 2>/dev/null
selfserv with PID 28671 found at Tue Nov 27 18:09:28 PST 2012
selfserv with PID 28671 started at Tue Nov 27 18:09:28 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:28 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:29 PST 2012
ssl.sh: #9427: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28671 at Tue Nov 27 18:09:29 PST 2012
kill -USR1 28671
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28671 killed at Tue Nov 27 18:09:29 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:09:29 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:29 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28729 >/dev/null 2>/dev/null
selfserv with PID 28729 found at Tue Nov 27 18:09:29 PST 2012
selfserv with PID 28729 started at Tue Nov 27 18:09:29 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:29 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:30 PST 2012
ssl.sh: #9428: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28729 at Tue Nov 27 18:09:30 PST 2012
kill -USR1 28729
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28729 killed at Tue Nov 27 18:09:30 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:30 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:30 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28808 >/dev/null 2>/dev/null
selfserv with PID 28808 found at Tue Nov 27 18:09:30 PST 2012
selfserv with PID 28808 started at Tue Nov 27 18:09:30 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:30 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:31 PST 2012
ssl.sh: #9429: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28808 at Tue Nov 27 18:09:31 PST 2012
kill -USR1 28808
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28808 killed at Tue Nov 27 18:09:31 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:09:31 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:31 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28866 >/dev/null 2>/dev/null
selfserv with PID 28866 found at Tue Nov 27 18:09:31 PST 2012
selfserv with PID 28866 started at Tue Nov 27 18:09:31 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:31 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:31 PST 2012
ssl.sh: #9430: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28866 at Tue Nov 27 18:09:31 PST 2012
kill -USR1 28866
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28866 killed at Tue Nov 27 18:09:32 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28924 >/dev/null 2>/dev/null
selfserv with PID 28924 found at Tue Nov 27 18:09:32 PST 2012
selfserv with PID 28924 started at Tue Nov 27 18:09:32 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:32 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:32 PST 2012
ssl.sh: #9431: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28924 at Tue Nov 27 18:09:32 PST 2012
kill -USR1 28924
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28924 killed at Tue Nov 27 18:09:32 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:32 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:32 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 28982 >/dev/null 2>/dev/null
selfserv with PID 28982 found at Tue Nov 27 18:09:32 PST 2012
selfserv with PID 28982 started at Tue Nov 27 18:09:32 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:33 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:33 PST 2012
ssl.sh: #9432: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28982 at Tue Nov 27 18:09:33 PST 2012
kill -USR1 28982
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 28982 killed at Tue Nov 27 18:09:33 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:09:33 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:33 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29040 >/dev/null 2>/dev/null
selfserv with PID 29040 found at Tue Nov 27 18:09:33 PST 2012
selfserv with PID 29040 started at Tue Nov 27 18:09:33 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:33 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:34 PST 2012
ssl.sh: #9433: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29040 at Tue Nov 27 18:09:34 PST 2012
kill -USR1 29040
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29040 killed at Tue Nov 27 18:09:34 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:09:34 PST 2012
selfserv -D -p 8546 -d ../server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:34 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29098 >/dev/null 2>/dev/null
selfserv with PID 29098 found at Tue Nov 27 18:09:34 PST 2012
selfserv with PID 29098 started at Tue Nov 27 18:09:34 PST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:34 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:34 PST 2012
ssl.sh: #9434: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29098 at Tue Nov 27 18:09:35 PST 2012
kill -USR1 29098
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29098 killed at Tue Nov 27 18:09:35 PST 2012
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:09:35 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:35 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29230 >/dev/null 2>/dev/null
selfserv with PID 29230 found at Tue Nov 27 18:09:35 PST 2012
selfserv with PID 29230 started at Tue Nov 27 18:09:35 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:35 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:36 PST 2012
ssl.sh: #9435: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29230 at Tue Nov 27 18:09:36 PST 2012
kill -USR1 29230
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29230 killed at Tue Nov 27 18:09:36 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:09:36 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:36 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29288 >/dev/null 2>/dev/null
selfserv with PID 29288 found at Tue Nov 27 18:09:36 PST 2012
selfserv with PID 29288 started at Tue Nov 27 18:09:36 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:36 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:37 PST 2012
ssl.sh: #9436: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29288 at Tue Nov 27 18:09:37 PST 2012
kill -USR1 29288
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29288 killed at Tue Nov 27 18:09:37 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:09:37 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss   -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:37 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29346 >/dev/null 2>/dev/null
selfserv with PID 29346 found at Tue Nov 27 18:09:37 PST 2012
selfserv with PID 29346 started at Tue Nov 27 18:09:37 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:37 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:38 PST 2012
ssl.sh: #9437: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29346 at Tue Nov 27 18:09:38 PST 2012
kill -USR1 29346
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29346 killed at Tue Nov 27 18:09:38 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:09:38 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:38 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29404 >/dev/null 2>/dev/null
selfserv with PID 29404 found at Tue Nov 27 18:09:38 PST 2012
selfserv with PID 29404 started at Tue Nov 27 18:09:38 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:38 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:39 PST 2012
ssl.sh: #9438: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29404 at Tue Nov 27 18:09:39 PST 2012
kill -USR1 29404
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29404 killed at Tue Nov 27 18:09:39 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:09:39 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:39 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29462 >/dev/null 2>/dev/null
selfserv with PID 29462 found at Tue Nov 27 18:09:40 PST 2012
selfserv with PID 29462 started at Tue Nov 27 18:09:40 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:40 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:41 PST 2012
ssl.sh: #9439: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29462 at Tue Nov 27 18:09:41 PST 2012
kill -USR1 29462
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29462 killed at Tue Nov 27 18:09:41 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:09:41 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:41 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29521 >/dev/null 2>/dev/null
selfserv with PID 29521 found at Tue Nov 27 18:09:41 PST 2012
selfserv with PID 29521 started at Tue Nov 27 18:09:41 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:41 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:42 PST 2012
ssl.sh: #9440: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29521 at Tue Nov 27 18:09:42 PST 2012
kill -USR1 29521
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29521 killed at Tue Nov 27 18:09:42 PST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:09:42 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:42 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29579 >/dev/null 2>/dev/null
selfserv with PID 29579 found at Tue Nov 27 18:09:42 PST 2012
selfserv with PID 29579 started at Tue Nov 27 18:09:42 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:42 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:09:44 PST 2012
ssl.sh: #9441: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29579 at Tue Nov 27 18:09:44 PST 2012
kill -USR1 29579
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29579 killed at Tue Nov 27 18:09:44 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:44 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:44 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29676 >/dev/null 2>/dev/null
selfserv with PID 29676 found at Tue Nov 27 18:09:44 PST 2012
selfserv with PID 29676 started at Tue Nov 27 18:09:44 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:44 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:46 PST 2012
ssl.sh: #9442: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29676 at Tue Nov 27 18:09:46 PST 2012
kill -USR1 29676
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29676 killed at Tue Nov 27 18:09:46 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:09:46 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:46 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29734 >/dev/null 2>/dev/null
selfserv with PID 29734 found at Tue Nov 27 18:09:46 PST 2012
selfserv with PID 29734 started at Tue Nov 27 18:09:46 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:46 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:48 PST 2012
ssl.sh: #9443: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29734 at Tue Nov 27 18:09:48 PST 2012
kill -USR1 29734
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29734 killed at Tue Nov 27 18:09:48 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:09:48 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:48 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29792 >/dev/null 2>/dev/null
selfserv with PID 29792 found at Tue Nov 27 18:09:48 PST 2012
selfserv with PID 29792 started at Tue Nov 27 18:09:48 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:48 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:49 PST 2012
ssl.sh: #9444: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29792 at Tue Nov 27 18:09:49 PST 2012
kill -USR1 29792
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29792 killed at Tue Nov 27 18:09:49 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:09:49 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:49 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29850 >/dev/null 2>/dev/null
selfserv with PID 29850 found at Tue Nov 27 18:09:49 PST 2012
selfserv with PID 29850 started at Tue Nov 27 18:09:49 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:49 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:49 PST 2012
ssl.sh: #9445: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29850 at Tue Nov 27 18:09:49 PST 2012
kill -USR1 29850
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29850 killed at Tue Nov 27 18:09:49 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:09:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29908 >/dev/null 2>/dev/null
selfserv with PID 29908 found at Tue Nov 27 18:09:50 PST 2012
selfserv with PID 29908 started at Tue Nov 27 18:09:50 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:50 PST 2012
ssl.sh: #9446: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29908 at Tue Nov 27 18:09:50 PST 2012
kill -USR1 29908
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29908 killed at Tue Nov 27 18:09:50 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:09:50 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:50 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 29966 >/dev/null 2>/dev/null
selfserv with PID 29966 found at Tue Nov 27 18:09:50 PST 2012
selfserv with PID 29966 started at Tue Nov 27 18:09:50 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:50 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:51 PST 2012
ssl.sh: #9447: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29966 at Tue Nov 27 18:09:51 PST 2012
kill -USR1 29966
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 29966 killed at Tue Nov 27 18:09:51 PST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:09:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -u -z -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30024 >/dev/null 2>/dev/null
selfserv with PID 30024 found at Tue Nov 27 18:09:51 PST 2012
selfserv with PID 30024 started at Tue Nov 27 18:09:51 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:51 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:09:51 PST 2012
ssl.sh: #9448: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30024 at Tue Nov 27 18:09:51 PST 2012
kill -USR1 30024
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30024 killed at Tue Nov 27 18:09:51 PST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:09:51 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:51 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30111 >/dev/null 2>/dev/null
selfserv with PID 30111 found at Tue Nov 27 18:09:51 PST 2012
selfserv with PID 30111 started at Tue Nov 27 18:09:52 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:52 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:55 PST 2012
ssl.sh: #9449: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30111 at Tue Nov 27 18:09:55 PST 2012
kill -USR1 30111
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30111 killed at Tue Nov 27 18:09:55 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:09:55 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:55 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30169 >/dev/null 2>/dev/null
selfserv with PID 30169 found at Tue Nov 27 18:09:55 PST 2012
selfserv with PID 30169 started at Tue Nov 27 18:09:55 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:55 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:09:56 PST 2012
ssl.sh: #9450: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30169 at Tue Nov 27 18:09:56 PST 2012
kill -USR1 30169
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30169 killed at Tue Nov 27 18:09:56 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:09:56 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:56 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30227 >/dev/null 2>/dev/null
selfserv with PID 30227 found at Tue Nov 27 18:09:56 PST 2012
selfserv with PID 30227 started at Tue Nov 27 18:09:56 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:56 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:09:59 PST 2012
ssl.sh: #9451: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30227 at Tue Nov 27 18:09:59 PST 2012
kill -USR1 30227
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30227 killed at Tue Nov 27 18:09:59 PST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:09:59 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:09:59 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30285 >/dev/null 2>/dev/null
selfserv with PID 30285 found at Tue Nov 27 18:09:59 PST 2012
selfserv with PID 30285 started at Tue Nov 27 18:09:59 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:09:59 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:10:00 PST 2012
ssl.sh: #9452: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30285 at Tue Nov 27 18:10:00 PST 2012
kill -USR1 30285
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30285 killed at Tue Nov 27 18:10:00 PST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:10:00 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:00 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30343 >/dev/null 2>/dev/null
selfserv with PID 30343 found at Tue Nov 27 18:10:01 PST 2012
selfserv with PID 30343 started at Tue Nov 27 18:10:01 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:01 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:10:02 PST 2012
ssl.sh: #9453: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30343 at Tue Nov 27 18:10:02 PST 2012
kill -USR1 30343
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30343 killed at Tue Nov 27 18:10:02 PST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:10:02 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -c :C004 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:02 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30402 >/dev/null 2>/dev/null
selfserv with PID 30402 found at Tue Nov 27 18:10:02 PST 2012
selfserv with PID 30402 started at Tue Nov 27 18:10:02 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:02 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:10:03 PST 2012
ssl.sh: #9454: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30402 at Tue Nov 27 18:10:03 PST 2012
kill -USR1 30402
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30402 killed at Tue Nov 27 18:10:03 PST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:10:03 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C009 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:03 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30481 >/dev/null 2>/dev/null
selfserv with PID 30481 found at Tue Nov 27 18:10:03 PST 2012
selfserv with PID 30481 started at Tue Nov 27 18:10:03 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:03 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:10:04 PST 2012
ssl.sh: #9455: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30481 at Tue Nov 27 18:10:04 PST 2012
kill -USR1 30481
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30481 killed at Tue Nov 27 18:10:04 PST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:10:04 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:04 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30539 >/dev/null 2>/dev/null
selfserv with PID 30539 found at Tue Nov 27 18:10:04 PST 2012
selfserv with PID 30539 started at Tue Nov 27 18:10:04 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:04 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:10:05 PST 2012
ssl.sh: #9456: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30539 at Tue Nov 27 18:10:05 PST 2012
kill -USR1 30539
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30539 killed at Tue Nov 27 18:10:05 PST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:10:05 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C004 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:05 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30597 >/dev/null 2>/dev/null
selfserv with PID 30597 found at Tue Nov 27 18:10:05 PST 2012
selfserv with PID 30597 started at Tue Nov 27 18:10:05 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:05 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:10:06 PST 2012
ssl.sh: #9457: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30597 at Tue Nov 27 18:10:06 PST 2012
kill -USR1 30597
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30597 killed at Tue Nov 27 18:10:06 PST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:10:06 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:06 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30655 >/dev/null 2>/dev/null
selfserv with PID 30655 found at Tue Nov 27 18:10:06 PST 2012
selfserv with PID 30655 started at Tue Nov 27 18:10:06 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:06 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:10:07 PST 2012
ssl.sh: #9458: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30655 at Tue Nov 27 18:10:07 PST 2012
kill -USR1 30655
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30655 killed at Tue Nov 27 18:10:07 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:10:07 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:07 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 18:10:07 PST 2012
selfserv with PID 30713 started at Tue Nov 27 18:10:07 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:07 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:10:08 PST 2012
ssl.sh: #9459: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30713 at Tue Nov 27 18:10:08 PST 2012
kill -USR1 30713
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30713 killed at Tue Nov 27 18:10:08 PST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:10:08 PST 2012
selfserv -D -p 8546 -d ../ext_server -n nss-vm-darwin9-1.community.scl3.mozilla.com -B -s \
         -e nss-vm-darwin9-1.community.scl3.mozilla.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.64867  &
trying to connect to selfserv at Tue Nov 27 18:10:08 PST 2012
tstclnt -p 8546 -h nss-vm-darwin9-1.community.scl3.mozilla.com -B -s -q \
        -d ../ext_client -v < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8546 (address=63.245.223.21)
kill -0 30771 >/dev/null 2>/dev/null
selfserv with PID 30771 found at Tue Nov 27 18:10:08 PST 2012
selfserv with PID 30771 started at Tue Nov 27 18:10:08 PST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          nss-vm-darwin9-1.community.scl3.mozilla.com
strsclnt started at Tue Nov 27 18:10:08 PST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:10:09 PST 2012
ssl.sh: #9460: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30771 at Tue Nov 27 18:10:09 PST 2012
kill -USR1 30771
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv with PID 30771 killed at Tue Nov 27 18:10:09 PST 2012
TIMESTAMP ssl END: Tue Nov 27 18:10:09 PST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 18:10:09 PST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v1.64867 -t "Test1"
sdr.sh: #9461: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v2.64867 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #9462: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v3.64867 -t "1234567"
sdr.sh: #9463: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v1.64867 -t "Test1"
sdr.sh: #9464: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v2.64867 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #9465: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v3.64867 -t "1234567"
sdr.sh: #9466: Decrypt - Value 3  - PASSED
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v3.64867 -t Test2 -f ../tests.pw
merge.sh: #9467: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9468: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9469: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9470: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9471: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9472: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:03:06 2012
            Not After : Tue Nov 28 02:03:06 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:f1:8c:3d:1e:85:5b:c5:ca:64:ff:90:0e:55:76:e0:
                    04:47:ef:79:f6:5f:33:4b:01:99:c4:79:45:48:14:f4:
                    93:fe:e0:1b:91:86:73:21:de:90:ea:2f:85:54:45:6e:
                    2a:ca:67:0d:f4:ff:f4:a3:d1:41:03:7b:64:ff:9e:66:
                    60:7e:51:1b:35:b2:91:30:12:27:d4:86:03:68:ea:ae:
                    71:55:a8:e8:c0:4f:72:5b:4a:d4:9d:d4:06:b2:72:43:
                    41:2e:c5:42:35:19:a1:3d:5a:01:d4:1d:8b:bf:e5:85:
                    19:db:68:71:45:a3:af:10:3c:ff:c4:8e:ff:83:8b:95
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4b:85:84:1a:a1:28:99:aa:66:55:b9:e5:67:0d:5d:60:
        dd:a9:d8:cb:2e:5b:cd:f5:f2:89:46:0a:c0:b4:23:41:
        13:1b:2c:b5:80:ad:dc:57:1f:3c:66:9b:35:43:f4:25:
        04:76:c4:50:d7:7f:3d:72:31:78:8e:fc:0e:61:4c:73:
        c5:c5:2e:49:4b:6b:67:df:75:0b:ae:78:c8:6a:7a:4e:
        18:e4:f6:f8:0d:16:7f:8c:69:4b:76:1b:96:16:00:dd:
        11:84:61:b6:5e:68:eb:fc:63:f0:b3:f6:73:41:5f:8e:
        bc:d4:4a:29:9d:60:22:35:f1:46:da:fc:28:a7:38:81
    Fingerprint (MD5):
        7A:11:30:5D:C2:87:C1:7D:4F:FE:58:AE:CA:D6:47:B6
    Fingerprint (SHA1):
        6F:3A:78:80:EF:7E:0B:9B:0D:D7:FD:6C:04:ED:7A:FF:55:15:C5:EE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #9473: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 02:03:08 2012
            Not After : Tue Nov 28 02:03:08 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:36:28:81:ad:c7:5a:46:64:7a:88:96:4f:66:01:29:
                    36:f0:e3:22:7e:11:45:b5:88:be:79:e4:d3:03:7d:94:
                    b2:0e:ba:3d:d2:f7:32:c3:c4:f2:5f:5b:64:d1:2c:0d:
                    f7:46:0a:93:f4:27:72:a0:4e:0d:7d:fc:63:22:c1:b7:
                    5d:17:fb:fa:b4:eb:81:c7:9e:eb:34:d8:dc:a8:f2:39:
                    e8:95:e4:d9:11:c4:9c:a2:43:a8:6d:66:da:a6:d9:3e:
                    39:03:da:08:f9:5d:3b:59:e7:45:6e:58:bd:f1:75:7a:
                    a1:e0:c5:3e:ac:89:fe:ce:57:a9:4c:ac:e4:0e:6f:21
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1a:ef:2a:18:cd:5a:22:25:b5:d3:f2:bb:4e:a5:8c:cb:
        09:82:58:07:bd:40:93:41:14:70:51:b2:18:82:a9:f7:
        ac:9e:c8:6d:de:68:fa:11:3a:17:5e:f8:b0:b6:3a:a5:
        94:70:87:17:1c:23:4c:7c:4e:3f:2b:a4:75:c3:cd:0c:
        fa:af:aa:a7:bb:82:9f:ec:c3:82:87:a4:b9:64:79:22:
        ac:73:38:6d:55:81:a1:fa:27:19:94:76:09:d7:4c:c0:
        e6:ee:a3:c0:0d:44:9c:91:b9:a7:61:d2:5b:2a:86:0d:
        cd:97:c7:56:d5:ae:70:cf:c4:9c:4c:01:7f:de:3e:40
    Fingerprint (MD5):
        C8:79:E1:22:CD:E7:7F:5B:5F:84:55:C0:E6:12:61:72
    Fingerprint (SHA1):
        6A:8F:A0:70:25:F0:68:C8:88:96:32:96:07:72:80:89:68:8E:C4:F9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #9474: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9475: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice                                                        u,u,u
Alice-ec                                                     u,u,u
Alice-ecmixed                                                u,u,u
bob@bogus.com                                                ,,   
Dave                                                         u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
Dave-ec                                                      u,u,u
Dave-ecmixed                                                 u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com                  u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com-ec               u,u,u
nss-vm-darwin9-1.community.scl3.mozilla.com-ecmixed          u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com              u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ec           u,u,u
nss-vm-darwin9-1-sni.community.scl3.mozilla.com-ecmixed      u,u,u
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           u,u,u
serverCA-ec                                                  C,C,C
ExtendedSSLUser-ecmixed                                      u,u,u
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
chain-2-clientCA-ec                                          ,,   
chain-2-clientCA                                             ,,   
clientCA-ec                                                  T,C,C
clientCA                                                     T,C,C
Alice #2                                                     ,,   
Alice #1                                                     ,,   
Alice #99                                                    ,,   
Alice #3                                                     ,,   
Alice #4                                                     ,,   
Alice #100                                                   ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v3.64867 -t Test2 -f ../tests.pw
merge.sh: #9476: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests.v1.64867 -t Test1 -f ../tests.pw
merge.sh: #9477: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #9478: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #9479: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #9480: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 02:03:28 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 02:00:53 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 02:03:26 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #9481: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Tue Nov 27 18:10:16 PST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 18:10:16 PST 2012
~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/aiahttp ~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/chains
httpserv starting at Tue Nov 27 18:10:16 PST 2012
httpserv -D -p 8556  \
         -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/aiahttp/http_pid.64867  &
trying to connect to httpserv at Tue Nov 27 18:10:16 PST 2012
tstclnt -p 8556 -h nss-vm-darwin9-1.community.scl3.mozilla.com -q -v
tstclnt: connecting to nss-vm-darwin9-1.community.scl3.mozilla.com:8556 (address=63.245.223.21)
kill -0 31047 >/dev/null 2>/dev/null
httpserv with PID 31047 found at Tue Nov 27 18:10:16 PST 2012
httpserv with PID 31047 started at Tue Nov 27 18:10:16 PST 2012
~/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #9482: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181017 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9483: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #9484: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #9485: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181018 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9486: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #9487: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #9488: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9489: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127181019 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9490: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #9491: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127181020 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9492: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #9493: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #9494: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9495: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9496: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127181021   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9497: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #9498: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9499: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #9500: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #9501: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181018 (0x432f6ada)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:18 2012
            Not After : Tue Nov 28 02:10:18 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f7:6d:ad:f3:d8:04:3f:2c:ce:0e:94:9e:ca:cc:fe:
                    50:61:99:59:db:73:9e:b6:53:c9:e4:43:fd:8f:e9:b1:
                    58:9c:75:fc:a2:cf:69:7c:2c:aa:f7:ec:90:14:24:65:
                    39:83:13:57:7b:3e:3d:48:26:db:cf:77:34:93:ec:74:
                    de:4f:44:23:eb:5c:25:f5:0a:82:44:dc:d8:69:b7:67:
                    04:76:6a:46:d0:49:fe:63:46:48:65:a5:4e:0a:66:d9:
                    e0:6c:f4:47:a9:cf:ba:a9:28:ab:82:43:5f:c4:c1:64:
                    5f:31:48:a6:7e:94:3b:3d:9b:53:01:d7:ba:d9:2c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:85:e3:70:98:26:73:37:aa:44:22:de:2f:eb:05:86:
        48:79:b3:1a:15:65:e7:40:43:24:8b:08:82:73:1e:b6:
        4c:ce:a9:94:ee:70:ce:13:47:e7:6a:92:60:97:e1:3f:
        d8:7b:8b:6e:8b:5e:c2:51:84:ea:48:47:66:12:2b:76:
        79:22:94:14:bc:5f:6a:4c:19:af:bd:db:f4:41:4a:bf:
        16:ff:24:c2:b3:83:ea:52:c0:99:df:1c:1e:ba:0b:a5:
        ce:4a:0e:1c:de:54:2a:10:cf:4f:65:b7:dd:b6:38:37:
        85:bf:ce:cd:1b:b3:46:f4:a9:36:34:f6:bc:f0:9b:86
    Fingerprint (MD5):
        BF:E8:AC:B7:7A:22:FE:E8:01:7C:36:5E:22:7D:70:EE
    Fingerprint (SHA1):
        A9:50:F8:E8:D4:AB:60:84:CC:48:DD:3A:52:2D:0F:4F:85:DB:95:4B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9502: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181017 (0x432f6ad9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:17 2012
            Not After : Tue Nov 28 02:10:17 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:6e:7a:cf:0b:56:cc:6b:19:1c:98:b5:cc:bb:5c:db:
                    e1:92:d9:a6:fe:c9:0c:3d:92:46:2d:db:e6:80:3d:74:
                    81:6a:19:45:fd:8a:6c:a1:15:82:4f:80:bc:1d:10:9f:
                    bd:2b:db:eb:07:06:61:bb:3c:fe:52:81:a7:e8:2f:4c:
                    64:a1:63:3c:df:a3:b8:ba:e3:21:85:27:41:25:6f:ac:
                    53:56:3b:c3:a4:90:25:18:2a:88:31:2a:7e:8a:09:50:
                    37:3e:63:22:b8:1d:6f:b0:58:5a:d4:c7:92:88:15:77:
                    bb:68:ae:a1:ad:a5:56:a6:40:ae:8d:50:35:dc:2a:19
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:7a:9e:c0:bb:89:fc:db:69:e9:1c:43:98:1e:c5:25:
        f2:a4:38:85:aa:ed:9c:4d:c6:a5:21:0c:ca:df:aa:9c:
        27:7d:83:58:8b:a1:8f:23:b8:79:15:22:45:6f:a4:9f:
        82:c2:b2:04:8a:16:05:25:24:b4:8c:9d:9d:84:c6:ac:
        3f:4a:17:67:d5:d1:5e:92:53:5a:4b:3f:fd:58:0b:bb:
        94:d7:c8:52:23:dd:9f:6a:b3:92:63:2f:4f:44:f7:53:
        ab:d2:0a:af:2f:dc:ed:ea:eb:7d:8a:0f:1c:e0:f6:84:
        1f:91:d1:78:b3:4d:87:cf:f6:65:43:f1:be:94:ac:59
    Fingerprint (MD5):
        59:05:FF:E7:54:48:C0:96:FC:32:93:46:54:AF:5A:A0
    Fingerprint (SHA1):
        8B:01:F5:64:EB:D8:89:D8:08:80:D3:01:AF:0B:1C:2D:41:64:6E:E4

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9503: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9504: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #9505: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #9506: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181017 (0x432f6ad9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:17 2012
            Not After : Tue Nov 28 02:10:17 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:6e:7a:cf:0b:56:cc:6b:19:1c:98:b5:cc:bb:5c:db:
                    e1:92:d9:a6:fe:c9:0c:3d:92:46:2d:db:e6:80:3d:74:
                    81:6a:19:45:fd:8a:6c:a1:15:82:4f:80:bc:1d:10:9f:
                    bd:2b:db:eb:07:06:61:bb:3c:fe:52:81:a7:e8:2f:4c:
                    64:a1:63:3c:df:a3:b8:ba:e3:21:85:27:41:25:6f:ac:
                    53:56:3b:c3:a4:90:25:18:2a:88:31:2a:7e:8a:09:50:
                    37:3e:63:22:b8:1d:6f:b0:58:5a:d4:c7:92:88:15:77:
                    bb:68:ae:a1:ad:a5:56:a6:40:ae:8d:50:35:dc:2a:19
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:7a:9e:c0:bb:89:fc:db:69:e9:1c:43:98:1e:c5:25:
        f2:a4:38:85:aa:ed:9c:4d:c6:a5:21:0c:ca:df:aa:9c:
        27:7d:83:58:8b:a1:8f:23:b8:79:15:22:45:6f:a4:9f:
        82:c2:b2:04:8a:16:05:25:24:b4:8c:9d:9d:84:c6:ac:
        3f:4a:17:67:d5:d1:5e:92:53:5a:4b:3f:fd:58:0b:bb:
        94:d7:c8:52:23:dd:9f:6a:b3:92:63:2f:4f:44:f7:53:
        ab:d2:0a:af:2f:dc:ed:ea:eb:7d:8a:0f:1c:e0:f6:84:
        1f:91:d1:78:b3:4d:87:cf:f6:65:43:f1:be:94:ac:59
    Fingerprint (MD5):
        59:05:FF:E7:54:48:C0:96:FC:32:93:46:54:AF:5A:A0
    Fingerprint (SHA1):
        8B:01:F5:64:EB:D8:89:D8:08:80:D3:01:AF:0B:1C:2D:41:64:6E:E4

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9507: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181018 (0x432f6ada)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:18 2012
            Not After : Tue Nov 28 02:10:18 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f7:6d:ad:f3:d8:04:3f:2c:ce:0e:94:9e:ca:cc:fe:
                    50:61:99:59:db:73:9e:b6:53:c9:e4:43:fd:8f:e9:b1:
                    58:9c:75:fc:a2:cf:69:7c:2c:aa:f7:ec:90:14:24:65:
                    39:83:13:57:7b:3e:3d:48:26:db:cf:77:34:93:ec:74:
                    de:4f:44:23:eb:5c:25:f5:0a:82:44:dc:d8:69:b7:67:
                    04:76:6a:46:d0:49:fe:63:46:48:65:a5:4e:0a:66:d9:
                    e0:6c:f4:47:a9:cf:ba:a9:28:ab:82:43:5f:c4:c1:64:
                    5f:31:48:a6:7e:94:3b:3d:9b:53:01:d7:ba:d9:2c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:85:e3:70:98:26:73:37:aa:44:22:de:2f:eb:05:86:
        48:79:b3:1a:15:65:e7:40:43:24:8b:08:82:73:1e:b6:
        4c:ce:a9:94:ee:70:ce:13:47:e7:6a:92:60:97:e1:3f:
        d8:7b:8b:6e:8b:5e:c2:51:84:ea:48:47:66:12:2b:76:
        79:22:94:14:bc:5f:6a:4c:19:af:bd:db:f4:41:4a:bf:
        16:ff:24:c2:b3:83:ea:52:c0:99:df:1c:1e:ba:0b:a5:
        ce:4a:0e:1c:de:54:2a:10:cf:4f:65:b7:dd:b6:38:37:
        85:bf:ce:cd:1b:b3:46:f4:a9:36:34:f6:bc:f0:9b:86
    Fingerprint (MD5):
        BF:E8:AC:B7:7A:22:FE:E8:01:7C:36:5E:22:7D:70:EE
    Fingerprint (SHA1):
        A9:50:F8:E8:D4:AB:60:84:CC:48:DD:3A:52:2D:0F:4F:85:DB:95:4B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9508: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #9509: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #9510: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9511: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9512: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9513: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181018 (0x432f6ada)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:18 2012
            Not After : Tue Nov 28 02:10:18 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f7:6d:ad:f3:d8:04:3f:2c:ce:0e:94:9e:ca:cc:fe:
                    50:61:99:59:db:73:9e:b6:53:c9:e4:43:fd:8f:e9:b1:
                    58:9c:75:fc:a2:cf:69:7c:2c:aa:f7:ec:90:14:24:65:
                    39:83:13:57:7b:3e:3d:48:26:db:cf:77:34:93:ec:74:
                    de:4f:44:23:eb:5c:25:f5:0a:82:44:dc:d8:69:b7:67:
                    04:76:6a:46:d0:49:fe:63:46:48:65:a5:4e:0a:66:d9:
                    e0:6c:f4:47:a9:cf:ba:a9:28:ab:82:43:5f:c4:c1:64:
                    5f:31:48:a6:7e:94:3b:3d:9b:53:01:d7:ba:d9:2c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:85:e3:70:98:26:73:37:aa:44:22:de:2f:eb:05:86:
        48:79:b3:1a:15:65:e7:40:43:24:8b:08:82:73:1e:b6:
        4c:ce:a9:94:ee:70:ce:13:47:e7:6a:92:60:97:e1:3f:
        d8:7b:8b:6e:8b:5e:c2:51:84:ea:48:47:66:12:2b:76:
        79:22:94:14:bc:5f:6a:4c:19:af:bd:db:f4:41:4a:bf:
        16:ff:24:c2:b3:83:ea:52:c0:99:df:1c:1e:ba:0b:a5:
        ce:4a:0e:1c:de:54:2a:10:cf:4f:65:b7:dd:b6:38:37:
        85:bf:ce:cd:1b:b3:46:f4:a9:36:34:f6:bc:f0:9b:86
    Fingerprint (MD5):
        BF:E8:AC:B7:7A:22:FE:E8:01:7C:36:5E:22:7D:70:EE
    Fingerprint (SHA1):
        A9:50:F8:E8:D4:AB:60:84:CC:48:DD:3A:52:2D:0F:4F:85:DB:95:4B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9514: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181018 (0x432f6ada)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:18 2012
            Not After : Tue Nov 28 02:10:18 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f7:6d:ad:f3:d8:04:3f:2c:ce:0e:94:9e:ca:cc:fe:
                    50:61:99:59:db:73:9e:b6:53:c9:e4:43:fd:8f:e9:b1:
                    58:9c:75:fc:a2:cf:69:7c:2c:aa:f7:ec:90:14:24:65:
                    39:83:13:57:7b:3e:3d:48:26:db:cf:77:34:93:ec:74:
                    de:4f:44:23:eb:5c:25:f5:0a:82:44:dc:d8:69:b7:67:
                    04:76:6a:46:d0:49:fe:63:46:48:65:a5:4e:0a:66:d9:
                    e0:6c:f4:47:a9:cf:ba:a9:28:ab:82:43:5f:c4:c1:64:
                    5f:31:48:a6:7e:94:3b:3d:9b:53:01:d7:ba:d9:2c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:85:e3:70:98:26:73:37:aa:44:22:de:2f:eb:05:86:
        48:79:b3:1a:15:65:e7:40:43:24:8b:08:82:73:1e:b6:
        4c:ce:a9:94:ee:70:ce:13:47:e7:6a:92:60:97:e1:3f:
        d8:7b:8b:6e:8b:5e:c2:51:84:ea:48:47:66:12:2b:76:
        79:22:94:14:bc:5f:6a:4c:19:af:bd:db:f4:41:4a:bf:
        16:ff:24:c2:b3:83:ea:52:c0:99:df:1c:1e:ba:0b:a5:
        ce:4a:0e:1c:de:54:2a:10:cf:4f:65:b7:dd:b6:38:37:
        85:bf:ce:cd:1b:b3:46:f4:a9:36:34:f6:bc:f0:9b:86
    Fingerprint (MD5):
        BF:E8:AC:B7:7A:22:FE:E8:01:7C:36:5E:22:7D:70:EE
    Fingerprint (SHA1):
        A9:50:F8:E8:D4:AB:60:84:CC:48:DD:3A:52:2D:0F:4F:85:DB:95:4B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9515: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #9516: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #9517: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9518: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #9519: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #9520: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181017 (0x432f6ad9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:17 2012
            Not After : Tue Nov 28 02:10:17 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:6e:7a:cf:0b:56:cc:6b:19:1c:98:b5:cc:bb:5c:db:
                    e1:92:d9:a6:fe:c9:0c:3d:92:46:2d:db:e6:80:3d:74:
                    81:6a:19:45:fd:8a:6c:a1:15:82:4f:80:bc:1d:10:9f:
                    bd:2b:db:eb:07:06:61:bb:3c:fe:52:81:a7:e8:2f:4c:
                    64:a1:63:3c:df:a3:b8:ba:e3:21:85:27:41:25:6f:ac:
                    53:56:3b:c3:a4:90:25:18:2a:88:31:2a:7e:8a:09:50:
                    37:3e:63:22:b8:1d:6f:b0:58:5a:d4:c7:92:88:15:77:
                    bb:68:ae:a1:ad:a5:56:a6:40:ae:8d:50:35:dc:2a:19
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:7a:9e:c0:bb:89:fc:db:69:e9:1c:43:98:1e:c5:25:
        f2:a4:38:85:aa:ed:9c:4d:c6:a5:21:0c:ca:df:aa:9c:
        27:7d:83:58:8b:a1:8f:23:b8:79:15:22:45:6f:a4:9f:
        82:c2:b2:04:8a:16:05:25:24:b4:8c:9d:9d:84:c6:ac:
        3f:4a:17:67:d5:d1:5e:92:53:5a:4b:3f:fd:58:0b:bb:
        94:d7:c8:52:23:dd:9f:6a:b3:92:63:2f:4f:44:f7:53:
        ab:d2:0a:af:2f:dc:ed:ea:eb:7d:8a:0f:1c:e0:f6:84:
        1f:91:d1:78:b3:4d:87:cf:f6:65:43:f1:be:94:ac:59
    Fingerprint (MD5):
        59:05:FF:E7:54:48:C0:96:FC:32:93:46:54:AF:5A:A0
    Fingerprint (SHA1):
        8B:01:F5:64:EB:D8:89:D8:08:80:D3:01:AF:0B:1C:2D:41:64:6E:E4


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9521: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181017 (0x432f6ad9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:17 2012
            Not After : Tue Nov 28 02:10:17 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:6e:7a:cf:0b:56:cc:6b:19:1c:98:b5:cc:bb:5c:db:
                    e1:92:d9:a6:fe:c9:0c:3d:92:46:2d:db:e6:80:3d:74:
                    81:6a:19:45:fd:8a:6c:a1:15:82:4f:80:bc:1d:10:9f:
                    bd:2b:db:eb:07:06:61:bb:3c:fe:52:81:a7:e8:2f:4c:
                    64:a1:63:3c:df:a3:b8:ba:e3:21:85:27:41:25:6f:ac:
                    53:56:3b:c3:a4:90:25:18:2a:88:31:2a:7e:8a:09:50:
                    37:3e:63:22:b8:1d:6f:b0:58:5a:d4:c7:92:88:15:77:
                    bb:68:ae:a1:ad:a5:56:a6:40:ae:8d:50:35:dc:2a:19
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:7a:9e:c0:bb:89:fc:db:69:e9:1c:43:98:1e:c5:25:
        f2:a4:38:85:aa:ed:9c:4d:c6:a5:21:0c:ca:df:aa:9c:
        27:7d:83:58:8b:a1:8f:23:b8:79:15:22:45:6f:a4:9f:
        82:c2:b2:04:8a:16:05:25:24:b4:8c:9d:9d:84:c6:ac:
        3f:4a:17:67:d5:d1:5e:92:53:5a:4b:3f:fd:58:0b:bb:
        94:d7:c8:52:23:dd:9f:6a:b3:92:63:2f:4f:44:f7:53:
        ab:d2:0a:af:2f:dc:ed:ea:eb:7d:8a:0f:1c:e0:f6:84:
        1f:91:d1:78:b3:4d:87:cf:f6:65:43:f1:be:94:ac:59
    Fingerprint (MD5):
        59:05:FF:E7:54:48:C0:96:FC:32:93:46:54:AF:5A:A0
    Fingerprint (SHA1):
        8B:01:F5:64:EB:D8:89:D8:08:80:D3:01:AF:0B:1C:2D:41:64:6E:E4


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9522: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #9523: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181022 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9524: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #9525: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #9526: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181023 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9527: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #9528: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #9529: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181024 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9530: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #9531: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #9532: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181025 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9533: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #9534: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #9535: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181026 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9536: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #9537: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #9538: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181027 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9539: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #9540: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #9541: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181028 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9542: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #9543: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #9544: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181029 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9545: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #9546: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #9547: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181030 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9548: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #9549: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #9550: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o Bridge11Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9551: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127181031 -7 Bridge11@Root1  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9552: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #9553: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127181032 -7 Bridge11@Root2  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9554: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #9555: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127181033 -7 Bridge11@Root3  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9556: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #9557: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #9558: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #9559: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o Bridge12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9560: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127181034 -7 Bridge12@Root4  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9561: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #9562: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127181035 -7 Bridge12@Root5  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9563: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #9564: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127181036 -7 Bridge12@Root6  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9565: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #9566: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #9567: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #9568: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o Bridge13Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9569: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127181037 -7 Bridge13@Root7  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9570: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #9571: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127181038 -7 Bridge13@Root8  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9572: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #9573: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127181039 -7 Bridge13@Root9  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9574: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #9575: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #9576: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #9577: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o Bridge21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9578: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127181040 -7 Bridge21@Bridge11  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9579: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #9580: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127181041 -7 Bridge21@Bridge12  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9581: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #9582: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127181042 -7 Bridge21@Bridge13  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9583: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #9584: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #9585: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9586: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9587: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127181043   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9588: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #9589: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #9590: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9591: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127181044   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9592: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #9593: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181022 (0x432f6ade)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:27 2012
            Not After : Tue Nov 28 02:10:27 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f4:23:48:be:21:3e:4a:5a:c8:ef:5f:b9:85:00:1b:c9:
                    0f:be:c5:60:95:1d:26:70:c5:fd:af:8a:c5:cb:dc:8c:
                    a7:20:90:24:d5:31:d4:32:6b:54:d5:03:29:40:8c:c1:
                    d7:7f:40:53:48:1e:79:5d:52:a9:e0:ed:ed:46:fa:67:
                    44:d2:59:b6:11:01:ac:c6:14:3d:54:b1:73:1d:0e:75:
                    22:a2:29:ba:a7:05:7b:7e:7c:4b:40:0a:75:5e:00:67:
                    58:4c:92:2f:85:77:d4:28:e5:0c:c5:67:d5:9f:39:1f:
                    b1:43:e0:a6:55:9a:70:f1:29:b3:53:af:f4:f4:e1:d5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:30:8a:8c:f2:b1:ef:9a:3c:e9:c7:4e:0c:f2:cb:b6:
        cd:ad:0b:e7:53:65:5f:1a:48:d6:a6:9b:4a:c4:e0:79:
        02:17:95:b8:fe:d7:37:15:bc:6e:13:fb:a2:dc:d3:d8:
        60:d9:6d:f0:57:0b:07:af:45:fd:c0:a3:03:5a:36:b8:
        56:0f:75:21:7e:8a:63:39:e3:3a:5d:5e:0c:a7:cf:5f:
        c5:81:3c:a5:73:01:f3:f0:21:59:df:17:5c:d8:c2:13:
        13:5a:80:99:8d:04:f9:f2:3c:64:2c:47:9f:2e:85:8e:
        0d:b4:bc:8d:35:0e:bc:b5:62:de:d7:10:4f:98:17:99
    Fingerprint (MD5):
        F3:B0:35:B7:72:CC:CB:B5:0C:2B:DF:AE:F0:45:49:E8
    Fingerprint (SHA1):
        00:4E:C0:A6:FF:EE:A4:48:33:1A:A5:3D:5A:DF:71:2C:D9:56:63:CA


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9594: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181023 (0x432f6adf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:28 2012
            Not After : Tue Nov 28 02:10:28 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:9d:cc:65:0f:3e:46:b1:c4:5d:2c:0e:1f:c2:89:db:
                    3f:bf:1e:88:50:f6:cf:4e:29:78:c8:ab:a8:ad:38:96:
                    f1:02:7b:9f:b7:2f:b8:5b:d3:39:43:6d:61:aa:2f:e7:
                    f9:22:6a:f2:66:d8:63:e5:b6:89:a2:e5:0d:43:20:9e:
                    ea:56:cb:05:5b:1f:bc:ce:05:4c:ad:a9:45:19:18:e4:
                    0d:88:6f:83:23:a3:9a:72:9f:88:f6:6e:74:7c:9a:f2:
                    17:e3:c7:d6:cc:45:b0:86:14:02:a6:3c:b0:a9:46:d8:
                    43:5b:5b:ad:e9:54:de:97:39:04:47:df:62:9f:cd:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9d:73:1a:d6:3d:96:67:fa:48:e9:3a:93:84:62:f2:9c:
        39:0a:bf:e7:db:2c:b1:4a:9b:c8:88:16:f0:c2:89:52:
        28:5e:4c:7b:b9:3b:77:21:ca:5a:dc:7b:d6:5f:80:6b:
        23:23:4b:0d:27:61:1e:df:57:82:a3:d2:e9:29:8b:ee:
        f9:bf:1d:12:e7:8a:84:ed:e7:15:64:80:1d:6e:b6:45:
        9d:63:f9:a9:9b:f4:64:2f:f3:4a:eb:98:31:20:74:d5:
        ac:20:45:e8:bb:62:46:4a:a1:6a:c3:7f:d0:cd:c1:b7:
        0b:86:58:b4:65:20:47:41:c7:da:27:b8:55:79:4e:7d
    Fingerprint (MD5):
        66:D3:C5:9F:E7:BC:CB:83:AD:94:7F:C1:5A:DF:B5:F4
    Fingerprint (SHA1):
        91:E3:51:EA:45:16:7F:2A:F5:09:37:60:C5:E7:56:FC:13:BA:26:66


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9595: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181024 (0x432f6ae0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:29 2012
            Not After : Tue Nov 28 02:10:29 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:c3:b6:5d:1b:87:fe:0f:27:fb:e3:7d:44:ce:b0:e4:
                    68:5a:01:2e:84:70:5d:f2:d1:cc:1a:a4:f8:ee:84:67:
                    9c:4f:f5:f1:43:54:be:01:a4:b8:e0:41:02:65:1f:e4:
                    1d:a6:11:a8:df:78:5d:8b:35:aa:a7:77:bd:57:df:26:
                    1b:98:e8:cf:ca:8c:5b:af:46:5b:12:da:b9:b3:fb:f2:
                    a4:78:bb:77:49:e9:c6:d3:82:cf:f8:4d:bd:28:ab:49:
                    0d:74:2d:a1:2c:5f:31:87:dc:05:3a:86:04:cd:5b:ee:
                    26:0a:ff:ae:b3:90:fa:8b:88:c0:fb:85:df:45:f5:4f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        68:65:6d:46:dd:9b:40:97:ed:19:d9:6d:5f:e8:29:ce:
        3f:7b:8b:53:b4:43:e2:6e:bd:a5:d6:0f:bc:4c:98:26:
        2f:b8:fd:ca:ed:e6:28:89:c2:dc:f9:7b:33:56:6c:89:
        70:ea:cc:f3:7b:fe:08:37:74:69:41:d6:2f:d6:e1:ee:
        ac:90:11:74:2f:dd:2f:e1:52:98:ae:87:0d:0b:3a:3b:
        fd:a3:b6:39:fc:c5:56:d5:ed:0b:bd:e9:1a:8b:80:bd:
        e3:87:d1:24:40:4a:73:6b:3f:1a:44:27:35:4b:0b:f4:
        0a:e9:c9:ef:c2:0c:24:48:c6:87:50:32:e6:c4:1c:3f
    Fingerprint (MD5):
        6B:EC:A7:43:29:CE:12:17:4A:1D:E5:55:CA:3D:A6:41
    Fingerprint (SHA1):
        A8:5E:E2:92:79:41:D5:C6:DC:B2:A3:FD:B2:5A:D7:71:64:16:BA:EB


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9596: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181025 (0x432f6ae1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:30 2012
            Not After : Tue Nov 28 02:10:30 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ed:e2:50:e1:a9:0c:97:6a:ad:3e:d9:1b:a8:bf:36:85:
                    ec:2e:d3:03:c9:cc:42:3a:34:8e:41:9e:44:56:66:db:
                    ef:4f:36:6a:28:11:47:7b:b1:e7:99:2f:09:fc:de:0d:
                    72:4b:0e:a2:d1:5d:cb:34:9f:84:db:1c:29:8f:df:e5:
                    45:8e:c5:8b:89:e1:57:25:de:1f:00:a9:ed:e6:25:b5:
                    55:ed:51:9c:2c:48:77:a6:14:64:da:66:3a:c6:41:c1:
                    f1:74:35:4d:0a:2a:cb:26:57:bc:57:f9:b3:0b:ed:09:
                    5e:ed:42:a9:0a:8c:56:a6:e0:44:d7:7c:61:83:e2:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        33:23:d6:c7:7d:2d:07:ff:6f:a4:13:45:30:54:0f:05:
        02:a7:51:52:01:24:bf:0b:8d:c3:3e:d8:79:d0:8d:9e:
        5c:fb:23:a8:27:53:42:06:a4:6f:f9:7b:87:19:28:71:
        c5:32:02:02:ee:19:c0:1e:f0:ec:3e:05:51:36:b8:41:
        ba:82:dd:1e:2d:96:9a:cf:b3:77:f8:c4:4b:8c:4e:a4:
        8a:66:2a:43:02:62:42:7d:48:eb:0d:14:cc:25:ad:c6:
        e0:18:43:8b:6e:fd:34:a8:14:2a:48:a9:d3:af:30:d5:
        4a:73:59:3e:8a:bf:9d:39:db:01:94:cd:8f:e3:e3:df
    Fingerprint (MD5):
        47:BA:58:3D:42:43:22:8F:AC:60:1F:81:03:5D:96:DB
    Fingerprint (SHA1):
        F0:C1:CF:AC:7D:D5:B2:1A:F3:65:93:1D:90:DB:09:C2:D6:92:42:8E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9597: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181026 (0x432f6ae2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:30 2012
            Not After : Tue Nov 28 02:10:30 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:50:81:21:71:75:b8:d3:ad:f6:5c:53:f2:51:3e:1b:
                    cc:24:22:c1:5b:12:23:ae:45:90:4e:f1:2a:d0:41:74:
                    e1:97:c1:d6:c2:74:21:eb:d4:9a:34:32:0f:dc:9b:39:
                    90:e0:df:e0:c3:32:43:20:2a:b1:b5:a4:a2:ea:6a:51:
                    03:fc:8e:c3:b0:68:e8:a6:0d:47:c9:bb:0a:dd:c6:4a:
                    c8:2a:42:8d:25:e6:de:9b:e1:d8:a4:e8:95:e2:3f:a8:
                    4e:56:8c:0d:56:09:ec:ef:94:16:e1:c7:f0:d6:a3:4b:
                    42:1a:01:8f:97:2a:aa:d3:7c:1d:ae:5a:1a:43:b1:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ab:5e:84:a8:07:73:05:01:33:4e:1b:da:ee:dd:3e:ad:
        1d:8d:2d:12:35:91:22:4d:99:42:6c:55:4b:77:ea:5e:
        f0:c5:91:25:8c:e6:b1:0b:11:01:93:63:25:04:a8:e7:
        ad:22:66:bb:53:34:e0:0e:d0:25:e3:9d:8d:e5:d8:8d:
        d4:73:d0:e3:ce:9d:e2:84:87:fb:33:81:76:40:5f:84:
        af:92:9f:f5:e3:37:a6:d7:6f:14:36:8c:84:a2:d4:65:
        82:5a:7b:5f:e4:ae:0a:bb:9f:75:74:8b:f2:7e:3e:ce:
        ae:a8:bb:2e:6a:dc:7c:6d:a8:95:1c:75:7a:ef:01:84
    Fingerprint (MD5):
        8B:8B:2C:34:85:29:44:A8:87:48:98:28:DB:3F:B4:01
    Fingerprint (SHA1):
        15:07:BA:BE:AC:7D:E5:FC:7B:03:67:00:EF:45:F8:FB:7F:99:28:D8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9598: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181027 (0x432f6ae3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:31 2012
            Not After : Tue Nov 28 02:10:31 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:57:bc:55:ef:14:a0:cd:37:d3:fb:05:da:8f:3e:19:
                    a4:a5:08:24:fe:eb:90:4c:4e:03:35:8d:ad:3f:b4:dc:
                    27:9f:4e:58:54:88:91:f6:1a:e5:b5:ef:e2:24:e3:53:
                    bb:fe:b3:e2:24:c6:7b:0e:f1:00:c4:90:ea:5d:e9:58:
                    5e:74:06:b6:72:f1:6e:3d:75:2c:e6:56:e9:e4:ac:b0:
                    98:f9:e9:a7:b9:8c:bd:69:95:62:a7:69:c0:4c:71:15:
                    21:b1:63:6e:73:d5:cb:2c:8a:15:b4:56:bf:ce:a4:4d:
                    11:31:ab:05:05:eb:00:b4:9b:ca:31:33:94:aa:f3:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6c:7e:f9:92:72:da:ff:83:11:32:6b:e6:89:7c:7c:0f:
        c0:09:26:43:c8:63:78:58:61:bb:61:7a:25:69:52:16:
        ac:3c:a3:4c:21:7c:31:84:b8:9c:94:c6:89:2b:da:d5:
        57:d5:15:66:ff:c7:3e:5e:e7:30:19:38:0d:1f:2c:af:
        f9:61:8d:90:01:c8:c1:52:5c:69:1a:e2:18:97:f0:0e:
        75:06:75:ec:15:08:98:0b:2a:11:b9:7f:d7:8a:bf:f7:
        e5:a1:3f:61:55:da:60:62:fa:39:ea:b2:53:6c:1d:0a:
        fb:2d:2f:f4:22:87:74:c6:a8:1f:6f:12:17:4f:64:35
    Fingerprint (MD5):
        A3:AE:63:09:BB:17:D4:05:CB:81:36:AC:FD:C4:9D:66
    Fingerprint (SHA1):
        AA:40:B0:83:AB:0C:42:F9:A8:A2:A6:20:E3:FD:D6:E1:66:4B:74:E6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9599: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181028 (0x432f6ae4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:32 2012
            Not After : Tue Nov 28 02:10:32 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:2f:35:7d:81:64:9b:47:01:2f:34:8d:04:e7:f6:f2:
                    2c:8a:f1:e5:c5:f3:34:cd:d8:46:22:d9:12:4e:ba:27:
                    37:f2:21:89:f3:0f:18:b1:41:65:a7:f6:80:90:16:37:
                    9b:83:b7:5c:74:e1:76:31:8a:97:12:ee:7c:43:3e:b4:
                    f7:59:5b:67:9e:24:4f:c1:98:8e:5c:2a:5a:d8:3c:6e:
                    23:57:3a:51:95:b5:cb:f0:0d:ca:4a:ed:84:ae:d9:e0:
                    e6:8f:b6:7f:63:41:5a:51:2c:81:f9:78:5e:f1:45:e6:
                    2b:83:de:d1:48:97:7e:8c:8e:e8:8a:67:f0:9f:03:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        93:f1:27:5f:65:7f:78:e6:8e:df:a0:50:c4:60:05:e3:
        5d:eb:a8:45:6f:b2:e1:86:f0:46:2e:20:e2:d5:de:51:
        8f:ed:6d:8c:c4:09:01:fd:a0:ef:d3:f9:e6:69:b1:15:
        7f:4f:27:da:9a:c7:08:7c:ac:55:93:e5:ff:9c:be:73:
        b2:17:a7:82:a4:40:14:19:e6:82:fa:f6:87:04:08:93:
        c4:bb:61:10:d2:bc:59:e1:36:85:d7:9f:f8:49:01:05:
        c9:9b:a6:4d:39:70:f8:29:9e:db:bf:70:fb:ae:0f:ef:
        e2:6c:ac:12:09:10:2d:61:b8:f3:fc:1e:c7:6f:91:97
    Fingerprint (MD5):
        19:92:E3:E4:41:C1:9F:02:29:22:FC:D1:DE:FF:D8:97
    Fingerprint (SHA1):
        6A:7F:B5:86:28:EB:A9:E1:4F:68:CD:06:BC:91:65:BD:4D:3D:9F:C7


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9600: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181029 (0x432f6ae5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:33 2012
            Not After : Tue Nov 28 02:10:33 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9d:cd:b3:9b:b8:36:d5:86:90:65:16:1b:4c:03:a7:1a:
                    df:53:b5:0a:9d:30:94:ed:10:57:f6:1d:21:d3:e1:9d:
                    09:a6:dd:d4:fc:1a:a6:40:b6:fd:63:89:d5:38:9b:d2:
                    77:b9:29:eb:5c:24:b0:1d:2c:f3:e6:a2:83:ea:50:7b:
                    fb:b1:80:2c:75:b8:d2:8e:98:5f:bc:26:c8:36:73:25:
                    eb:71:a8:07:fd:2f:58:5d:3d:92:8f:ad:8e:8a:ce:4a:
                    9b:23:0d:1e:98:08:01:d3:68:5c:43:3c:fc:07:35:96:
                    c3:28:91:d3:7f:f1:be:ab:55:5b:3a:dd:ae:c4:56:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3b:5a:06:8e:01:af:63:c9:b4:a3:9f:f6:1a:04:ec:3d:
        be:d7:11:fa:30:29:30:2b:fd:eb:e6:af:de:66:f3:f4:
        1f:82:ba:ad:7f:47:bb:d1:e7:94:24:92:78:88:9d:58:
        ec:55:d3:e3:11:81:37:4e:0c:82:1e:66:02:f7:4b:4c:
        bd:4b:94:ac:f1:fb:b1:38:71:14:5d:2e:ea:1f:ea:48:
        c8:81:99:9a:f5:47:7f:d0:c5:97:88:d9:de:28:42:60:
        26:7e:04:2b:ef:44:9c:c1:e1:5b:2c:fd:2f:46:76:cf:
        a1:ac:42:ae:bd:ea:d6:b8:61:29:74:b0:83:f0:8a:c9
    Fingerprint (MD5):
        68:96:52:E9:CC:FB:4A:FD:B3:30:58:A1:69:EB:FA:10
    Fingerprint (SHA1):
        57:84:50:18:41:7D:11:60:1F:CE:46:6D:5E:D2:5D:DD:5A:22:61:30


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9601: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181030 (0x432f6ae6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:34 2012
            Not After : Tue Nov 28 02:10:34 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f0:42:1e:84:7b:df:b1:5e:c3:90:92:b6:b5:c2:f3:41:
                    4c:31:e9:28:89:79:84:f9:e1:2f:58:4c:af:39:4c:8e:
                    7b:1e:28:8b:a7:15:9e:50:cc:5b:52:8b:3c:24:96:ce:
                    d6:a8:dd:09:59:0a:b2:17:6f:85:ab:3b:b5:74:48:86:
                    93:af:84:a7:dd:fa:e7:5e:b6:35:97:f2:5b:7f:b6:a4:
                    c5:93:b2:e8:76:1c:bc:bf:f1:26:f1:cf:ee:a7:7d:5c:
                    2c:14:1b:2c:eb:52:fd:63:2b:06:8e:b1:e1:ab:a2:ad:
                    5b:0d:44:39:60:4d:13:d4:2b:90:82:19:1d:f7:c2:d3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        01:00:d6:32:01:2a:50:3a:a5:cf:bd:1d:7b:33:22:61:
        38:6a:d2:d7:91:39:2e:dd:d9:45:57:ce:66:2f:1a:5b:
        72:05:d3:b9:7c:3b:20:d6:97:dc:86:36:fc:4b:2b:2d:
        39:d3:e7:fe:31:78:d8:d5:de:bc:1d:7a:d9:3f:8c:74:
        41:22:3f:68:e7:42:6a:dd:b9:d6:1c:c6:7b:2a:16:b9:
        e2:e5:99:74:15:f3:ca:23:14:0a:38:3e:94:26:0b:1a:
        49:be:1a:da:bf:4c:4c:0b:7d:8b:01:54:ea:7d:d6:a2:
        7f:f0:0d:3a:a1:d7:e1:9a:df:3e:c6:1f:38:5c:43:6d
    Fingerprint (MD5):
        55:0E:6C:86:89:2D:2F:A3:08:E3:CB:E5:BA:46:90:8F
    Fingerprint (SHA1):
        A0:ED:9A:71:58:7C:16:B7:4F:6C:25:D1:B4:2B:BD:2D:BC:80:94:16


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9602: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9603: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181045 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9604: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9605: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9606: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9607: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127181046   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9608: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9609: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9610: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9611: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127181047   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9612: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9613: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9614: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9615: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127181048   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9616: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #9617: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9618: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181045 (0x432f6af5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:49 2012
            Not After : Tue Nov 28 02:10:49 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:91:48:be:92:1c:99:77:aa:a7:57:01:f2:d2:14:f1:
                    16:c0:6d:96:dc:55:61:99:5e:cf:7d:4d:39:24:69:28:
                    df:ef:98:d8:af:a4:ee:b2:1e:3a:ff:ef:cb:5c:84:88:
                    77:b9:90:0f:9b:ed:0d:88:ef:da:6c:6f:2f:56:02:1a:
                    2a:1b:42:ae:3b:a6:bc:a2:79:7e:96:2f:cd:7e:37:ed:
                    ae:82:49:06:00:fc:be:d0:e9:64:ea:65:ef:06:03:1d:
                    e5:a4:5e:00:db:28:47:42:3a:c7:0a:16:af:55:be:49:
                    1f:c4:98:c5:0a:40:d9:85:77:2f:5a:79:96:c2:48:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:64:1d:9a:a6:88:c1:4b:5e:6f:ba:1e:3f:86:2f:ec:
        c7:0a:cb:2a:a6:97:40:1d:ca:a9:0f:39:32:c1:b2:6a:
        89:c2:2d:1a:e1:d1:c9:10:ec:92:04:f5:c2:65:0b:ec:
        88:9e:92:96:62:82:ee:cc:0f:a2:e8:72:49:10:e9:c6:
        0a:41:3e:9e:c6:52:c5:c2:88:f8:59:33:73:c6:bd:16:
        01:9e:7e:3c:28:30:c2:e1:25:3b:f3:fd:11:c1:54:27:
        a3:18:1e:7b:7f:2e:96:31:24:54:21:13:15:35:04:8f:
        27:18:7d:37:b7:3e:eb:fb:7a:ee:9e:2e:73:e1:92:99
    Fingerprint (MD5):
        0F:CF:A9:A7:89:16:76:EC:73:B5:07:DB:0E:82:64:C2
    Fingerprint (SHA1):
        3A:8A:37:7C:66:59:41:2F:B4:11:79:C7:F1:0E:E7:30:37:3A:16:9E


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9619: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9620: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181046 (0x432f6af6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:50 2012
            Not After : Tue Nov 28 02:10:50 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:18:06:fd:7f:df:71:41:aa:94:14:b0:e1:eb:6e:33:
                    65:f4:64:d6:d7:94:55:16:d1:ef:2f:0b:76:92:e3:1f:
                    22:82:1c:53:64:a8:0e:b2:03:ee:4a:a0:e6:9e:07:e3:
                    07:b4:87:3e:24:ca:32:db:15:0d:1f:a4:ae:a0:bf:ea:
                    07:02:05:c4:c6:39:c2:6f:32:fd:d4:fc:17:53:da:9a:
                    eb:b5:e8:47:bc:d5:17:07:f1:f4:4e:3c:92:0d:42:45:
                    3a:e1:2a:70:fa:4e:c9:1c:42:e4:2e:46:35:8e:7c:04:
                    85:46:5a:0d:8a:a8:e2:ab:77:64:51:e9:5a:09:34:57
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b7:a9:34:4e:4d:a4:8b:67:4b:8b:82:3f:44:3f:c3:51:
        2d:f8:48:ce:c1:e4:e8:da:6a:25:6c:d1:1c:f3:d9:0a:
        4b:3c:52:1b:06:cd:68:62:52:d0:80:de:4a:58:82:d9:
        2e:87:c5:bd:b6:49:64:17:19:80:52:b3:ce:71:2c:be:
        4d:fe:75:18:f9:55:be:c0:c9:d3:83:1b:20:aa:4a:83:
        5d:7c:fb:b1:a7:87:24:3a:e4:53:e0:30:ee:8d:d6:cc:
        0d:dc:95:2e:2b:cc:20:35:1c:31:07:86:54:a1:de:1b:
        e8:23:77:85:76:9c:16:63:b9:37:63:1c:92:d6:07:1c
    Fingerprint (MD5):
        6B:D8:D9:ED:E1:48:47:9A:48:0E:EB:F6:B0:ED:97:09
    Fingerprint (SHA1):
        3B:EB:08:A1:AC:62:26:72:AB:70:59:36:72:4F:6D:3E:7D:D3:2A:3A


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9621: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9622: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181047 (0x432f6af7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:51 2012
            Not After : Tue Nov 28 02:10:51 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:6a:06:7f:ef:e9:c5:a2:11:6b:eb:79:8c:07:06:f2:
                    6b:bd:48:4e:95:44:3f:a4:c5:1a:f4:8a:e9:2b:60:f8:
                    97:3a:74:03:20:2c:87:8f:69:49:9d:48:5b:51:64:9f:
                    89:cf:38:dd:aa:d9:45:c3:5a:49:02:40:ad:bd:ad:0c:
                    d5:ab:42:f9:ce:9a:13:2e:b7:04:be:de:1e:f6:8c:ce:
                    44:c1:f0:73:0d:24:3a:77:42:0f:33:6f:21:eb:c1:b4:
                    3d:4c:7c:1f:04:d9:25:81:fb:a8:3e:b0:48:84:c9:5a:
                    a2:6d:c6:10:1d:d1:b5:2d:ee:ac:a8:0e:e8:7c:11:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:e3:ad:50:8d:2f:7e:b9:6b:02:ca:ea:00:fb:f4:65:
        1a:d6:0e:7e:38:ab:5c:57:e9:c3:5e:f3:6d:2c:7c:74:
        99:0f:41:25:79:a1:4d:e6:ef:40:72:2e:77:07:cb:c7:
        47:76:0e:3a:6c:2d:60:f7:44:4d:66:94:ec:6b:84:9a:
        fc:3a:f9:fd:de:de:f2:ff:ed:ba:03:22:64:48:e3:d9:
        46:a9:85:00:c9:50:76:cf:b1:9b:7a:e6:a4:6b:75:5a:
        b6:75:f8:41:d5:53:6e:6e:32:dc:8f:06:16:c9:d2:79:
        d3:be:ae:29:f2:ef:e2:cb:84:41:a0:b7:24:2a:7d:a7
    Fingerprint (MD5):
        8C:E2:5F:07:E9:4A:3C:EA:BC:2A:E4:29:7A:12:EE:3F
    Fingerprint (SHA1):
        1B:00:AA:02:14:72:9D:8B:00:9D:9A:26:C7:08:66:EE:7D:C8:47:AF


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9623: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9624: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9625: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9626: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9627: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181045 (0x432f6af5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:49 2012
            Not After : Tue Nov 28 02:10:49 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:91:48:be:92:1c:99:77:aa:a7:57:01:f2:d2:14:f1:
                    16:c0:6d:96:dc:55:61:99:5e:cf:7d:4d:39:24:69:28:
                    df:ef:98:d8:af:a4:ee:b2:1e:3a:ff:ef:cb:5c:84:88:
                    77:b9:90:0f:9b:ed:0d:88:ef:da:6c:6f:2f:56:02:1a:
                    2a:1b:42:ae:3b:a6:bc:a2:79:7e:96:2f:cd:7e:37:ed:
                    ae:82:49:06:00:fc:be:d0:e9:64:ea:65:ef:06:03:1d:
                    e5:a4:5e:00:db:28:47:42:3a:c7:0a:16:af:55:be:49:
                    1f:c4:98:c5:0a:40:d9:85:77:2f:5a:79:96:c2:48:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:64:1d:9a:a6:88:c1:4b:5e:6f:ba:1e:3f:86:2f:ec:
        c7:0a:cb:2a:a6:97:40:1d:ca:a9:0f:39:32:c1:b2:6a:
        89:c2:2d:1a:e1:d1:c9:10:ec:92:04:f5:c2:65:0b:ec:
        88:9e:92:96:62:82:ee:cc:0f:a2:e8:72:49:10:e9:c6:
        0a:41:3e:9e:c6:52:c5:c2:88:f8:59:33:73:c6:bd:16:
        01:9e:7e:3c:28:30:c2:e1:25:3b:f3:fd:11:c1:54:27:
        a3:18:1e:7b:7f:2e:96:31:24:54:21:13:15:35:04:8f:
        27:18:7d:37:b7:3e:eb:fb:7a:ee:9e:2e:73:e1:92:99
    Fingerprint (MD5):
        0F:CF:A9:A7:89:16:76:EC:73:B5:07:DB:0E:82:64:C2
    Fingerprint (SHA1):
        3A:8A:37:7C:66:59:41:2F:B4:11:79:C7:F1:0E:E7:30:37:3A:16:9E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9628: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9629: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181046 (0x432f6af6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:50 2012
            Not After : Tue Nov 28 02:10:50 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:18:06:fd:7f:df:71:41:aa:94:14:b0:e1:eb:6e:33:
                    65:f4:64:d6:d7:94:55:16:d1:ef:2f:0b:76:92:e3:1f:
                    22:82:1c:53:64:a8:0e:b2:03:ee:4a:a0:e6:9e:07:e3:
                    07:b4:87:3e:24:ca:32:db:15:0d:1f:a4:ae:a0:bf:ea:
                    07:02:05:c4:c6:39:c2:6f:32:fd:d4:fc:17:53:da:9a:
                    eb:b5:e8:47:bc:d5:17:07:f1:f4:4e:3c:92:0d:42:45:
                    3a:e1:2a:70:fa:4e:c9:1c:42:e4:2e:46:35:8e:7c:04:
                    85:46:5a:0d:8a:a8:e2:ab:77:64:51:e9:5a:09:34:57
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b7:a9:34:4e:4d:a4:8b:67:4b:8b:82:3f:44:3f:c3:51:
        2d:f8:48:ce:c1:e4:e8:da:6a:25:6c:d1:1c:f3:d9:0a:
        4b:3c:52:1b:06:cd:68:62:52:d0:80:de:4a:58:82:d9:
        2e:87:c5:bd:b6:49:64:17:19:80:52:b3:ce:71:2c:be:
        4d:fe:75:18:f9:55:be:c0:c9:d3:83:1b:20:aa:4a:83:
        5d:7c:fb:b1:a7:87:24:3a:e4:53:e0:30:ee:8d:d6:cc:
        0d:dc:95:2e:2b:cc:20:35:1c:31:07:86:54:a1:de:1b:
        e8:23:77:85:76:9c:16:63:b9:37:63:1c:92:d6:07:1c
    Fingerprint (MD5):
        6B:D8:D9:ED:E1:48:47:9A:48:0E:EB:F6:B0:ED:97:09
    Fingerprint (SHA1):
        3B:EB:08:A1:AC:62:26:72:AB:70:59:36:72:4F:6D:3E:7D:D3:2A:3A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9630: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9631: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181047 (0x432f6af7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:51 2012
            Not After : Tue Nov 28 02:10:51 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:6a:06:7f:ef:e9:c5:a2:11:6b:eb:79:8c:07:06:f2:
                    6b:bd:48:4e:95:44:3f:a4:c5:1a:f4:8a:e9:2b:60:f8:
                    97:3a:74:03:20:2c:87:8f:69:49:9d:48:5b:51:64:9f:
                    89:cf:38:dd:aa:d9:45:c3:5a:49:02:40:ad:bd:ad:0c:
                    d5:ab:42:f9:ce:9a:13:2e:b7:04:be:de:1e:f6:8c:ce:
                    44:c1:f0:73:0d:24:3a:77:42:0f:33:6f:21:eb:c1:b4:
                    3d:4c:7c:1f:04:d9:25:81:fb:a8:3e:b0:48:84:c9:5a:
                    a2:6d:c6:10:1d:d1:b5:2d:ee:ac:a8:0e:e8:7c:11:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:e3:ad:50:8d:2f:7e:b9:6b:02:ca:ea:00:fb:f4:65:
        1a:d6:0e:7e:38:ab:5c:57:e9:c3:5e:f3:6d:2c:7c:74:
        99:0f:41:25:79:a1:4d:e6:ef:40:72:2e:77:07:cb:c7:
        47:76:0e:3a:6c:2d:60:f7:44:4d:66:94:ec:6b:84:9a:
        fc:3a:f9:fd:de:de:f2:ff:ed:ba:03:22:64:48:e3:d9:
        46:a9:85:00:c9:50:76:cf:b1:9b:7a:e6:a4:6b:75:5a:
        b6:75:f8:41:d5:53:6e:6e:32:dc:8f:06:16:c9:d2:79:
        d3:be:ae:29:f2:ef:e2:cb:84:41:a0:b7:24:2a:7d:a7
    Fingerprint (MD5):
        8C:E2:5F:07:E9:4A:3C:EA:BC:2A:E4:29:7A:12:EE:3F
    Fingerprint (SHA1):
        1B:00:AA:02:14:72:9D:8B:00:9D:9A:26:C7:08:66:EE:7D:C8:47:AF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9632: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9633: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9634: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181049 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9635: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9636: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9637: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9638: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127181050   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9639: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9640: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9641: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9642: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127181051   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9643: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9644: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #9645: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o User1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9646: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127181052   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9647: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #9648: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #9649: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o User2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9650: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127181053   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9651: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #9652: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9653: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181049 (0x432f6af9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:57 2012
            Not After : Tue Nov 28 02:10:57 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:79:cb:77:76:82:80:23:78:4f:4f:59:34:2c:82:d6:
                    79:51:39:d1:13:af:13:6b:7a:fc:5f:f9:7f:d9:7f:3e:
                    4b:e0:b9:29:36:c6:9e:f9:99:a8:36:8f:85:6a:09:0e:
                    28:0f:e6:66:cd:30:de:30:64:5a:38:23:26:67:61:60:
                    0f:00:9b:d8:14:af:d0:20:fc:2a:54:f9:46:ab:aa:ba:
                    92:49:e1:1d:13:18:8b:de:a0:19:a1:fc:ba:8b:e0:5e:
                    89:d1:80:8d:28:87:84:e1:5f:eb:90:c8:54:ca:85:95:
                    51:62:2e:68:b9:5b:a3:9c:76:5f:58:f1:91:e9:6a:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:82:ab:7e:d5:2d:fb:3a:73:c8:f5:7d:de:3a:59:fe:
        00:ae:e1:d6:db:e8:2c:ba:9a:29:a5:d5:2e:2b:9f:50:
        d4:02:70:b1:35:7e:94:50:d1:0c:da:97:f5:48:27:78:
        20:5b:57:64:6c:9b:d2:89:f9:ad:4f:7d:e8:5b:6f:cc:
        61:ca:67:6e:dc:0c:d2:ff:63:62:73:7a:ec:1f:ea:69:
        99:a6:f5:d2:56:a9:b3:2b:aa:e9:7b:52:b1:8b:4f:ce:
        fa:f3:b0:8f:0e:c7:da:e3:33:ae:29:73:a5:f4:19:15:
        9a:d1:10:e7:10:06:5f:64:0a:26:6e:ef:bb:c4:0e:28
    Fingerprint (MD5):
        5A:70:1E:E0:8E:69:BE:D6:0A:16:CB:6B:01:83:BC:00
    Fingerprint (SHA1):
        46:D0:F4:09:7D:86:19:7F:4D:09:31:9D:72:F7:E5:25:A2:28:F8:5C


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9654: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9655: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181050 (0x432f6afa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:58 2012
            Not After : Tue Nov 28 02:10:58 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:46:95:f2:ad:e4:06:da:00:57:43:be:4b:9c:0b:59:
                    7b:8e:64:0d:3e:f4:db:fa:ad:61:2c:32:6b:59:2f:f4:
                    ad:de:dc:c3:67:7a:7c:86:e8:4d:16:9b:43:0e:2a:8d:
                    5d:da:ce:5d:69:91:db:10:2d:a5:4c:5c:81:18:fa:ef:
                    92:96:12:ac:84:8b:fe:91:9d:80:60:e4:0e:2b:63:f1:
                    33:a0:74:8b:62:ae:31:47:94:87:65:63:e0:50:ba:05:
                    8b:5c:87:ec:8b:31:8c:d2:e5:6e:00:74:62:09:2d:52:
                    2a:06:8d:18:63:a3:a4:02:69:82:3c:c7:6b:92:d5:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:b1:cd:4d:41:34:a3:c8:41:39:bd:ab:2f:f9:da:34:
        16:b7:5e:fd:28:05:c8:f0:bb:f5:ed:37:14:32:ab:51:
        ef:4f:e1:3e:af:b7:90:22:cd:de:f3:d3:4c:fa:12:a2:
        12:e9:60:e4:aa:a6:cf:a2:40:b5:7e:87:23:b9:62:72:
        20:e6:6f:17:9e:86:72:88:79:ad:26:7c:a9:39:17:e0:
        a5:5a:bd:88:fc:f5:51:b4:c3:4f:84:b0:f8:08:1b:8a:
        ee:10:72:4e:bd:d4:f4:83:d3:c1:e2:a1:b2:6c:4c:f8:
        3a:71:e8:b3:23:8e:a7:ac:b3:b6:b2:6e:8a:88:a1:b3
    Fingerprint (MD5):
        A3:FD:66:05:8C:8D:6E:47:DD:26:7B:F2:3E:D5:7B:A6
    Fingerprint (SHA1):
        05:18:76:10:F0:92:CE:AD:5F:25:DE:1D:47:F5:6A:47:EF:25:49:DF


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9656: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9657: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181051 (0x432f6afb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:59 2012
            Not After : Tue Nov 28 02:10:59 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:67:aa:8f:9c:b8:08:3b:45:67:07:90:b3:2e:79:7d:
                    ff:4c:6e:2b:c4:02:dd:72:65:d6:70:eb:78:9d:d8:83:
                    fb:e1:1c:ff:a3:2b:9c:fc:d0:09:e5:29:93:df:18:ba:
                    0f:5d:58:60:ff:d4:24:f9:f0:69:b5:30:fe:10:9c:f1:
                    40:5c:11:03:c8:14:f9:ce:35:17:d5:a0:f8:f8:08:75:
                    31:04:b1:de:fa:85:76:8f:50:c9:94:0f:e8:27:d9:32:
                    de:6c:63:7d:6d:95:c2:a6:c3:fd:17:af:ca:c0:73:83:
                    26:c6:c4:be:70:ed:e4:a2:f9:65:97:94:40:f6:8a:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:63:bf:91:df:a8:cc:5d:d4:67:5b:d1:a6:18:73:28:
        81:da:63:29:97:2d:eb:13:17:09:83:ff:3d:4a:b8:a7:
        19:e9:20:9e:5a:f5:98:fe:82:65:a8:01:24:cb:8e:4e:
        1e:30:4f:e1:62:a9:45:08:51:5e:c5:36:d2:80:09:32:
        92:5c:31:53:c8:35:dc:d0:d1:82:d7:bf:d7:94:c0:ef:
        15:4b:3d:b8:f5:e7:d4:03:ce:57:e6:e6:8d:8e:4b:6c:
        69:41:33:63:91:e3:ac:0f:86:fc:1a:0a:fb:77:1f:bb:
        d8:63:63:00:2f:70:08:c7:2e:c6:4a:d5:e4:2e:a9:92
    Fingerprint (MD5):
        66:B8:7D:71:72:34:8A:0C:10:F6:37:BF:2A:65:B8:16
    Fingerprint (SHA1):
        01:DE:A7:1E:0B:6E:57:46:21:A9:AA:FB:AE:12:48:43:DB:D3:57:80


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9658: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9659: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9660: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9661: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9662: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181049 (0x432f6af9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:57 2012
            Not After : Tue Nov 28 02:10:57 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:79:cb:77:76:82:80:23:78:4f:4f:59:34:2c:82:d6:
                    79:51:39:d1:13:af:13:6b:7a:fc:5f:f9:7f:d9:7f:3e:
                    4b:e0:b9:29:36:c6:9e:f9:99:a8:36:8f:85:6a:09:0e:
                    28:0f:e6:66:cd:30:de:30:64:5a:38:23:26:67:61:60:
                    0f:00:9b:d8:14:af:d0:20:fc:2a:54:f9:46:ab:aa:ba:
                    92:49:e1:1d:13:18:8b:de:a0:19:a1:fc:ba:8b:e0:5e:
                    89:d1:80:8d:28:87:84:e1:5f:eb:90:c8:54:ca:85:95:
                    51:62:2e:68:b9:5b:a3:9c:76:5f:58:f1:91:e9:6a:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:82:ab:7e:d5:2d:fb:3a:73:c8:f5:7d:de:3a:59:fe:
        00:ae:e1:d6:db:e8:2c:ba:9a:29:a5:d5:2e:2b:9f:50:
        d4:02:70:b1:35:7e:94:50:d1:0c:da:97:f5:48:27:78:
        20:5b:57:64:6c:9b:d2:89:f9:ad:4f:7d:e8:5b:6f:cc:
        61:ca:67:6e:dc:0c:d2:ff:63:62:73:7a:ec:1f:ea:69:
        99:a6:f5:d2:56:a9:b3:2b:aa:e9:7b:52:b1:8b:4f:ce:
        fa:f3:b0:8f:0e:c7:da:e3:33:ae:29:73:a5:f4:19:15:
        9a:d1:10:e7:10:06:5f:64:0a:26:6e:ef:bb:c4:0e:28
    Fingerprint (MD5):
        5A:70:1E:E0:8E:69:BE:D6:0A:16:CB:6B:01:83:BC:00
    Fingerprint (SHA1):
        46:D0:F4:09:7D:86:19:7F:4D:09:31:9D:72:F7:E5:25:A2:28:F8:5C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9663: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9664: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181050 (0x432f6afa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:58 2012
            Not After : Tue Nov 28 02:10:58 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:46:95:f2:ad:e4:06:da:00:57:43:be:4b:9c:0b:59:
                    7b:8e:64:0d:3e:f4:db:fa:ad:61:2c:32:6b:59:2f:f4:
                    ad:de:dc:c3:67:7a:7c:86:e8:4d:16:9b:43:0e:2a:8d:
                    5d:da:ce:5d:69:91:db:10:2d:a5:4c:5c:81:18:fa:ef:
                    92:96:12:ac:84:8b:fe:91:9d:80:60:e4:0e:2b:63:f1:
                    33:a0:74:8b:62:ae:31:47:94:87:65:63:e0:50:ba:05:
                    8b:5c:87:ec:8b:31:8c:d2:e5:6e:00:74:62:09:2d:52:
                    2a:06:8d:18:63:a3:a4:02:69:82:3c:c7:6b:92:d5:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:b1:cd:4d:41:34:a3:c8:41:39:bd:ab:2f:f9:da:34:
        16:b7:5e:fd:28:05:c8:f0:bb:f5:ed:37:14:32:ab:51:
        ef:4f:e1:3e:af:b7:90:22:cd:de:f3:d3:4c:fa:12:a2:
        12:e9:60:e4:aa:a6:cf:a2:40:b5:7e:87:23:b9:62:72:
        20:e6:6f:17:9e:86:72:88:79:ad:26:7c:a9:39:17:e0:
        a5:5a:bd:88:fc:f5:51:b4:c3:4f:84:b0:f8:08:1b:8a:
        ee:10:72:4e:bd:d4:f4:83:d3:c1:e2:a1:b2:6c:4c:f8:
        3a:71:e8:b3:23:8e:a7:ac:b3:b6:b2:6e:8a:88:a1:b3
    Fingerprint (MD5):
        A3:FD:66:05:8C:8D:6E:47:DD:26:7B:F2:3E:D5:7B:A6
    Fingerprint (SHA1):
        05:18:76:10:F0:92:CE:AD:5F:25:DE:1D:47:F5:6A:47:EF:25:49:DF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9665: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9666: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181051 (0x432f6afb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:59 2012
            Not After : Tue Nov 28 02:10:59 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:67:aa:8f:9c:b8:08:3b:45:67:07:90:b3:2e:79:7d:
                    ff:4c:6e:2b:c4:02:dd:72:65:d6:70:eb:78:9d:d8:83:
                    fb:e1:1c:ff:a3:2b:9c:fc:d0:09:e5:29:93:df:18:ba:
                    0f:5d:58:60:ff:d4:24:f9:f0:69:b5:30:fe:10:9c:f1:
                    40:5c:11:03:c8:14:f9:ce:35:17:d5:a0:f8:f8:08:75:
                    31:04:b1:de:fa:85:76:8f:50:c9:94:0f:e8:27:d9:32:
                    de:6c:63:7d:6d:95:c2:a6:c3:fd:17:af:ca:c0:73:83:
                    26:c6:c4:be:70:ed:e4:a2:f9:65:97:94:40:f6:8a:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:63:bf:91:df:a8:cc:5d:d4:67:5b:d1:a6:18:73:28:
        81:da:63:29:97:2d:eb:13:17:09:83:ff:3d:4a:b8:a7:
        19:e9:20:9e:5a:f5:98:fe:82:65:a8:01:24:cb:8e:4e:
        1e:30:4f:e1:62:a9:45:08:51:5e:c5:36:d2:80:09:32:
        92:5c:31:53:c8:35:dc:d0:d1:82:d7:bf:d7:94:c0:ef:
        15:4b:3d:b8:f5:e7:d4:03:ce:57:e6:e6:8d:8e:4b:6c:
        69:41:33:63:91:e3:ac:0f:86:fc:1a:0a:fb:77:1f:bb:
        d8:63:63:00:2f:70:08:c7:2e:c6:4a:d5:e4:2e:a9:92
    Fingerprint (MD5):
        66:B8:7D:71:72:34:8A:0C:10:F6:37:BF:2A:65:B8:16
    Fingerprint (SHA1):
        01:DE:A7:1E:0B:6E:57:46:21:A9:AA:FB:AE:12:48:43:DB:D3:57:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9667: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9668: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181049 (0x432f6af9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:57 2012
            Not After : Tue Nov 28 02:10:57 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:79:cb:77:76:82:80:23:78:4f:4f:59:34:2c:82:d6:
                    79:51:39:d1:13:af:13:6b:7a:fc:5f:f9:7f:d9:7f:3e:
                    4b:e0:b9:29:36:c6:9e:f9:99:a8:36:8f:85:6a:09:0e:
                    28:0f:e6:66:cd:30:de:30:64:5a:38:23:26:67:61:60:
                    0f:00:9b:d8:14:af:d0:20:fc:2a:54:f9:46:ab:aa:ba:
                    92:49:e1:1d:13:18:8b:de:a0:19:a1:fc:ba:8b:e0:5e:
                    89:d1:80:8d:28:87:84:e1:5f:eb:90:c8:54:ca:85:95:
                    51:62:2e:68:b9:5b:a3:9c:76:5f:58:f1:91:e9:6a:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:82:ab:7e:d5:2d:fb:3a:73:c8:f5:7d:de:3a:59:fe:
        00:ae:e1:d6:db:e8:2c:ba:9a:29:a5:d5:2e:2b:9f:50:
        d4:02:70:b1:35:7e:94:50:d1:0c:da:97:f5:48:27:78:
        20:5b:57:64:6c:9b:d2:89:f9:ad:4f:7d:e8:5b:6f:cc:
        61:ca:67:6e:dc:0c:d2:ff:63:62:73:7a:ec:1f:ea:69:
        99:a6:f5:d2:56:a9:b3:2b:aa:e9:7b:52:b1:8b:4f:ce:
        fa:f3:b0:8f:0e:c7:da:e3:33:ae:29:73:a5:f4:19:15:
        9a:d1:10:e7:10:06:5f:64:0a:26:6e:ef:bb:c4:0e:28
    Fingerprint (MD5):
        5A:70:1E:E0:8E:69:BE:D6:0A:16:CB:6B:01:83:BC:00
    Fingerprint (SHA1):
        46:D0:F4:09:7D:86:19:7F:4D:09:31:9D:72:F7:E5:25:A2:28:F8:5C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9669: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181049 (0x432f6af9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:57 2012
            Not After : Tue Nov 28 02:10:57 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:79:cb:77:76:82:80:23:78:4f:4f:59:34:2c:82:d6:
                    79:51:39:d1:13:af:13:6b:7a:fc:5f:f9:7f:d9:7f:3e:
                    4b:e0:b9:29:36:c6:9e:f9:99:a8:36:8f:85:6a:09:0e:
                    28:0f:e6:66:cd:30:de:30:64:5a:38:23:26:67:61:60:
                    0f:00:9b:d8:14:af:d0:20:fc:2a:54:f9:46:ab:aa:ba:
                    92:49:e1:1d:13:18:8b:de:a0:19:a1:fc:ba:8b:e0:5e:
                    89:d1:80:8d:28:87:84:e1:5f:eb:90:c8:54:ca:85:95:
                    51:62:2e:68:b9:5b:a3:9c:76:5f:58:f1:91:e9:6a:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:82:ab:7e:d5:2d:fb:3a:73:c8:f5:7d:de:3a:59:fe:
        00:ae:e1:d6:db:e8:2c:ba:9a:29:a5:d5:2e:2b:9f:50:
        d4:02:70:b1:35:7e:94:50:d1:0c:da:97:f5:48:27:78:
        20:5b:57:64:6c:9b:d2:89:f9:ad:4f:7d:e8:5b:6f:cc:
        61:ca:67:6e:dc:0c:d2:ff:63:62:73:7a:ec:1f:ea:69:
        99:a6:f5:d2:56:a9:b3:2b:aa:e9:7b:52:b1:8b:4f:ce:
        fa:f3:b0:8f:0e:c7:da:e3:33:ae:29:73:a5:f4:19:15:
        9a:d1:10:e7:10:06:5f:64:0a:26:6e:ef:bb:c4:0e:28
    Fingerprint (MD5):
        5A:70:1E:E0:8E:69:BE:D6:0A:16:CB:6B:01:83:BC:00
    Fingerprint (SHA1):
        46:D0:F4:09:7D:86:19:7F:4D:09:31:9D:72:F7:E5:25:A2:28:F8:5C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9670: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181050 (0x432f6afa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:58 2012
            Not After : Tue Nov 28 02:10:58 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:46:95:f2:ad:e4:06:da:00:57:43:be:4b:9c:0b:59:
                    7b:8e:64:0d:3e:f4:db:fa:ad:61:2c:32:6b:59:2f:f4:
                    ad:de:dc:c3:67:7a:7c:86:e8:4d:16:9b:43:0e:2a:8d:
                    5d:da:ce:5d:69:91:db:10:2d:a5:4c:5c:81:18:fa:ef:
                    92:96:12:ac:84:8b:fe:91:9d:80:60:e4:0e:2b:63:f1:
                    33:a0:74:8b:62:ae:31:47:94:87:65:63:e0:50:ba:05:
                    8b:5c:87:ec:8b:31:8c:d2:e5:6e:00:74:62:09:2d:52:
                    2a:06:8d:18:63:a3:a4:02:69:82:3c:c7:6b:92:d5:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:b1:cd:4d:41:34:a3:c8:41:39:bd:ab:2f:f9:da:34:
        16:b7:5e:fd:28:05:c8:f0:bb:f5:ed:37:14:32:ab:51:
        ef:4f:e1:3e:af:b7:90:22:cd:de:f3:d3:4c:fa:12:a2:
        12:e9:60:e4:aa:a6:cf:a2:40:b5:7e:87:23:b9:62:72:
        20:e6:6f:17:9e:86:72:88:79:ad:26:7c:a9:39:17:e0:
        a5:5a:bd:88:fc:f5:51:b4:c3:4f:84:b0:f8:08:1b:8a:
        ee:10:72:4e:bd:d4:f4:83:d3:c1:e2:a1:b2:6c:4c:f8:
        3a:71:e8:b3:23:8e:a7:ac:b3:b6:b2:6e:8a:88:a1:b3
    Fingerprint (MD5):
        A3:FD:66:05:8C:8D:6E:47:DD:26:7B:F2:3E:D5:7B:A6
    Fingerprint (SHA1):
        05:18:76:10:F0:92:CE:AD:5F:25:DE:1D:47:F5:6A:47:EF:25:49:DF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9671: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181050 (0x432f6afa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:58 2012
            Not After : Tue Nov 28 02:10:58 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:46:95:f2:ad:e4:06:da:00:57:43:be:4b:9c:0b:59:
                    7b:8e:64:0d:3e:f4:db:fa:ad:61:2c:32:6b:59:2f:f4:
                    ad:de:dc:c3:67:7a:7c:86:e8:4d:16:9b:43:0e:2a:8d:
                    5d:da:ce:5d:69:91:db:10:2d:a5:4c:5c:81:18:fa:ef:
                    92:96:12:ac:84:8b:fe:91:9d:80:60:e4:0e:2b:63:f1:
                    33:a0:74:8b:62:ae:31:47:94:87:65:63:e0:50:ba:05:
                    8b:5c:87:ec:8b:31:8c:d2:e5:6e:00:74:62:09:2d:52:
                    2a:06:8d:18:63:a3:a4:02:69:82:3c:c7:6b:92:d5:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:b1:cd:4d:41:34:a3:c8:41:39:bd:ab:2f:f9:da:34:
        16:b7:5e:fd:28:05:c8:f0:bb:f5:ed:37:14:32:ab:51:
        ef:4f:e1:3e:af:b7:90:22:cd:de:f3:d3:4c:fa:12:a2:
        12:e9:60:e4:aa:a6:cf:a2:40:b5:7e:87:23:b9:62:72:
        20:e6:6f:17:9e:86:72:88:79:ad:26:7c:a9:39:17:e0:
        a5:5a:bd:88:fc:f5:51:b4:c3:4f:84:b0:f8:08:1b:8a:
        ee:10:72:4e:bd:d4:f4:83:d3:c1:e2:a1:b2:6c:4c:f8:
        3a:71:e8:b3:23:8e:a7:ac:b3:b6:b2:6e:8a:88:a1:b3
    Fingerprint (MD5):
        A3:FD:66:05:8C:8D:6E:47:DD:26:7B:F2:3E:D5:7B:A6
    Fingerprint (SHA1):
        05:18:76:10:F0:92:CE:AD:5F:25:DE:1D:47:F5:6A:47:EF:25:49:DF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9672: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181051 (0x432f6afb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:59 2012
            Not After : Tue Nov 28 02:10:59 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:67:aa:8f:9c:b8:08:3b:45:67:07:90:b3:2e:79:7d:
                    ff:4c:6e:2b:c4:02:dd:72:65:d6:70:eb:78:9d:d8:83:
                    fb:e1:1c:ff:a3:2b:9c:fc:d0:09:e5:29:93:df:18:ba:
                    0f:5d:58:60:ff:d4:24:f9:f0:69:b5:30:fe:10:9c:f1:
                    40:5c:11:03:c8:14:f9:ce:35:17:d5:a0:f8:f8:08:75:
                    31:04:b1:de:fa:85:76:8f:50:c9:94:0f:e8:27:d9:32:
                    de:6c:63:7d:6d:95:c2:a6:c3:fd:17:af:ca:c0:73:83:
                    26:c6:c4:be:70:ed:e4:a2:f9:65:97:94:40:f6:8a:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:63:bf:91:df:a8:cc:5d:d4:67:5b:d1:a6:18:73:28:
        81:da:63:29:97:2d:eb:13:17:09:83:ff:3d:4a:b8:a7:
        19:e9:20:9e:5a:f5:98:fe:82:65:a8:01:24:cb:8e:4e:
        1e:30:4f:e1:62:a9:45:08:51:5e:c5:36:d2:80:09:32:
        92:5c:31:53:c8:35:dc:d0:d1:82:d7:bf:d7:94:c0:ef:
        15:4b:3d:b8:f5:e7:d4:03:ce:57:e6:e6:8d:8e:4b:6c:
        69:41:33:63:91:e3:ac:0f:86:fc:1a:0a:fb:77:1f:bb:
        d8:63:63:00:2f:70:08:c7:2e:c6:4a:d5:e4:2e:a9:92
    Fingerprint (MD5):
        66:B8:7D:71:72:34:8A:0C:10:F6:37:BF:2A:65:B8:16
    Fingerprint (SHA1):
        01:DE:A7:1E:0B:6E:57:46:21:A9:AA:FB:AE:12:48:43:DB:D3:57:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9673: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181051 (0x432f6afb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:10:59 2012
            Not After : Tue Nov 28 02:10:59 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:67:aa:8f:9c:b8:08:3b:45:67:07:90:b3:2e:79:7d:
                    ff:4c:6e:2b:c4:02:dd:72:65:d6:70:eb:78:9d:d8:83:
                    fb:e1:1c:ff:a3:2b:9c:fc:d0:09:e5:29:93:df:18:ba:
                    0f:5d:58:60:ff:d4:24:f9:f0:69:b5:30:fe:10:9c:f1:
                    40:5c:11:03:c8:14:f9:ce:35:17:d5:a0:f8:f8:08:75:
                    31:04:b1:de:fa:85:76:8f:50:c9:94:0f:e8:27:d9:32:
                    de:6c:63:7d:6d:95:c2:a6:c3:fd:17:af:ca:c0:73:83:
                    26:c6:c4:be:70:ed:e4:a2:f9:65:97:94:40:f6:8a:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:63:bf:91:df:a8:cc:5d:d4:67:5b:d1:a6:18:73:28:
        81:da:63:29:97:2d:eb:13:17:09:83:ff:3d:4a:b8:a7:
        19:e9:20:9e:5a:f5:98:fe:82:65:a8:01:24:cb:8e:4e:
        1e:30:4f:e1:62:a9:45:08:51:5e:c5:36:d2:80:09:32:
        92:5c:31:53:c8:35:dc:d0:d1:82:d7:bf:d7:94:c0:ef:
        15:4b:3d:b8:f5:e7:d4:03:ce:57:e6:e6:8d:8e:4b:6c:
        69:41:33:63:91:e3:ac:0f:86:fc:1a:0a:fb:77:1f:bb:
        d8:63:63:00:2f:70:08:c7:2e:c6:4a:d5:e4:2e:a9:92
    Fingerprint (MD5):
        66:B8:7D:71:72:34:8A:0C:10:F6:37:BF:2A:65:B8:16
    Fingerprint (SHA1):
        01:DE:A7:1E:0B:6E:57:46:21:A9:AA:FB:AE:12:48:43:DB:D3:57:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9674: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #9675: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181054 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9676: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #9677: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9678: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9679: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127181055   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9680: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #9681: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9682: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9683: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127181056   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #9684: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9685: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #9686: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9687: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127181057   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9688: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #9689: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #9690: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o User1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9691: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127181058   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9692: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #9693: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #9694: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o User2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9695: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127181059   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9696: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #9697: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #9698: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o User3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9699: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127181060   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9700: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #9701: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9702: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #9703: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #9704: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9705: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #9706: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181054 (0x432f6afe)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:08 2012
            Not After : Tue Nov 28 02:11:08 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:f1:3e:02:c1:f4:d7:ad:ef:a6:7f:c7:7f:14:bb:83:
                    16:83:4e:77:84:e7:c5:f7:56:83:21:68:ce:72:a0:43:
                    1c:fd:b6:8a:c7:56:39:e4:a9:16:cd:6a:95:ae:45:9d:
                    ec:c2:8c:66:7f:12:f7:8f:37:72:f1:dd:86:0f:48:b7:
                    73:86:a6:10:4c:56:66:27:0e:ac:96:fa:f6:fb:4d:29:
                    5c:cc:0f:7f:b8:36:1e:01:f6:27:ff:63:57:00:eb:23:
                    ca:bb:20:6f:19:4e:ac:09:67:99:3d:c5:7b:ed:a1:5d:
                    f6:7c:eb:ff:7b:fb:5f:f4:c9:77:b1:e1:20:62:88:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:dc:47:10:dd:eb:12:66:46:e0:98:c8:8d:06:14:33:
        90:60:1c:3e:7b:fa:aa:94:49:be:69:4d:5c:9d:5b:f6:
        66:ff:07:89:81:34:c9:b5:b2:73:85:ea:ab:81:93:9e:
        aa:4f:82:4c:e7:4b:e0:40:eb:22:ec:05:bf:5f:8a:ab:
        fa:07:e2:d0:52:39:71:2d:57:50:a8:e0:7e:c6:89:18:
        97:0b:34:33:1d:09:39:50:17:18:4b:1e:b4:35:b0:8f:
        b0:10:6e:12:f1:9e:dd:e1:a2:06:2e:64:57:73:e7:6a:
        85:6d:4f:a7:1e:19:60:e3:52:6f:d6:25:0d:aa:46:cb
    Fingerprint (MD5):
        F8:C2:A7:EF:B8:D8:38:DB:7F:CD:19:E4:E5:6D:8F:4C
    Fingerprint (SHA1):
        B3:B9:7E:C1:7E:D3:24:39:20:68:86:ED:9E:37:F2:D2:DE:3E:56:34

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9707: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9708: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9709: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9710: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181054 (0x432f6afe)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:08 2012
            Not After : Tue Nov 28 02:11:08 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:f1:3e:02:c1:f4:d7:ad:ef:a6:7f:c7:7f:14:bb:83:
                    16:83:4e:77:84:e7:c5:f7:56:83:21:68:ce:72:a0:43:
                    1c:fd:b6:8a:c7:56:39:e4:a9:16:cd:6a:95:ae:45:9d:
                    ec:c2:8c:66:7f:12:f7:8f:37:72:f1:dd:86:0f:48:b7:
                    73:86:a6:10:4c:56:66:27:0e:ac:96:fa:f6:fb:4d:29:
                    5c:cc:0f:7f:b8:36:1e:01:f6:27:ff:63:57:00:eb:23:
                    ca:bb:20:6f:19:4e:ac:09:67:99:3d:c5:7b:ed:a1:5d:
                    f6:7c:eb:ff:7b:fb:5f:f4:c9:77:b1:e1:20:62:88:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:dc:47:10:dd:eb:12:66:46:e0:98:c8:8d:06:14:33:
        90:60:1c:3e:7b:fa:aa:94:49:be:69:4d:5c:9d:5b:f6:
        66:ff:07:89:81:34:c9:b5:b2:73:85:ea:ab:81:93:9e:
        aa:4f:82:4c:e7:4b:e0:40:eb:22:ec:05:bf:5f:8a:ab:
        fa:07:e2:d0:52:39:71:2d:57:50:a8:e0:7e:c6:89:18:
        97:0b:34:33:1d:09:39:50:17:18:4b:1e:b4:35:b0:8f:
        b0:10:6e:12:f1:9e:dd:e1:a2:06:2e:64:57:73:e7:6a:
        85:6d:4f:a7:1e:19:60:e3:52:6f:d6:25:0d:aa:46:cb
    Fingerprint (MD5):
        F8:C2:A7:EF:B8:D8:38:DB:7F:CD:19:E4:E5:6D:8F:4C
    Fingerprint (SHA1):
        B3:B9:7E:C1:7E:D3:24:39:20:68:86:ED:9E:37:F2:D2:DE:3E:56:34

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9711: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9712: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #9713: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181061 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9714: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #9715: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9716: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9717: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127181062   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #9718: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #9719: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #9720: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9721: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127181063   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9722: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #9723: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #9724: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA13Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9725: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127181064   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9726: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #9727: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #9728: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9729: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127181065   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9730: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #9731: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #9732: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA22Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9733: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127181066   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9734: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #9735: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #9736: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA23Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9737: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127181067   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9738: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #9739: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #9740: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9741: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127181068   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9742: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #9743: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #9744: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA32Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9745: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127181069   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #9746: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #9747: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #9748: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA33Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9749: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127181070   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9750: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #9751: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #9752: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9753: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127181071   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9754: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #9755: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #9756: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA42Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9757: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127181072   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9758: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #9759: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #9760: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA43Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9761: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127181073   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9762: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #9763: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #9764: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9765: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127181074   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9766: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #9767: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #9768: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA52Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9769: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127181075   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9770: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #9771: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #9772: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA53Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9773: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127181076   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9774: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #9775: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #9776: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE5Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9777: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127181077   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9778: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #9779: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #9780: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA61Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9781: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127181078   --extCP --extIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #9782: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #9783: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #9784: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA62Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9785: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127181079   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9786: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #9787: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #9788: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE62Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9789: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127181080   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9790: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #9791: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #9792: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA63Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9793: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127181081   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9794: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #9795: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #9796: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE63Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9797: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127181082   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9798: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #9799: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #9800: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA64Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9801: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127181083   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9802: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #9803: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #9804: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE64Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9805: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127181084   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9806: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #9807: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #9808: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA65Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9809: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127181085   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9810: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #9811: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #9812: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE65Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9813: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127181086   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9814: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #9815: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #9816: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA66Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9817: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127181087   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9818: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #9819: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #9820: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE66Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9821: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127181088   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9822: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #9823: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #9824: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA67Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9825: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127181089   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9826: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #9827: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #9828: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE67Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9829: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127181090   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9830: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #9831: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9832: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9833: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9834: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9835: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9836: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9837: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9838: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9839: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9840: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9841: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9842: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9843: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9844: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9845: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9846: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9847: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9848: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9849: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9850: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #9851: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #9852: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #9853: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #9854: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181061 (0x432f6b05)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:18 2012
            Not After : Tue Nov 28 02:11:18 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:e7:70:a7:7a:4e:50:4a:ad:a6:be:43:4b:08:fa:23:
                    30:33:5f:7d:fd:9a:fa:0e:55:e2:6b:67:12:92:c5:89:
                    6d:64:94:ad:6f:c8:3b:42:5b:81:47:ea:e8:82:f2:3a:
                    6e:32:78:66:ca:ab:67:f6:80:59:49:c5:2d:5d:e4:41:
                    d5:0a:e4:44:9c:8e:95:07:e3:4f:68:5a:90:9f:a0:60:
                    ea:47:0c:f0:be:62:4b:d6:d6:45:ee:7c:06:f4:6a:65:
                    cb:bc:b9:a4:95:0e:a1:cf:06:df:bd:27:28:8b:fa:8a:
                    2b:32:98:32:b2:9c:4a:09:f7:ac:d1:04:49:50:0c:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:f5:7c:99:74:c6:85:ed:9c:67:38:c1:81:ee:c0:82:
        cb:2d:4c:41:a4:6f:77:7c:d3:60:6c:1d:9e:cb:f2:8d:
        8f:7e:8b:d7:5c:20:76:85:ec:cd:28:9b:a2:81:83:47:
        d5:86:b4:5d:9e:79:d1:bd:cb:71:67:bb:91:b0:de:e2:
        67:09:16:a9:ed:30:ec:33:e7:0c:79:70:ce:65:12:87:
        77:8c:12:78:c5:b0:7e:cd:6e:bf:8f:ae:ad:ac:bd:6e:
        5e:50:3e:aa:95:58:ad:8f:f7:d5:cc:04:0f:8f:66:64:
        7f:d8:7a:0e:c7:88:92:8b:86:a2:d0:d8:e8:f0:2f:f5
    Fingerprint (MD5):
        E2:9D:FD:D1:44:B2:8A:30:70:9D:54:68:CA:CD:7A:25
    Fingerprint (SHA1):
        7B:48:2F:BA:C2:4D:C9:99:64:13:FD:86:C4:E2:AF:E4:DB:AB:A9:63


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #9855: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9856: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9857: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181091 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9858: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9859: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #9860: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o nonEVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9861: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127181092   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9862: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #9863: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #9864: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9865: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127181093   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9866: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #9867: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #9868: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o otherEVCAReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9869: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127181094   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9870: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #9871: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #9872: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o validEVReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9873: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127181095   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9874: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #9875: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #9876: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o invalidEVReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9877: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127181096   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9878: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #9879: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #9880: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o wrongEVOIDReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9881: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127181097   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9882: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #9883: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9884: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181091 (0x432f6b23)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:58 2012
            Not After : Tue Nov 28 02:11:58 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:d3:b1:83:eb:bc:2c:2a:d7:17:55:a9:45:e0:bd:04:
                    d3:50:89:95:49:23:d1:f7:e5:0a:07:10:ea:77:88:e9:
                    21:b8:c5:68:6f:28:37:d9:68:aa:8d:ea:fe:a9:ad:c3:
                    c5:94:0d:a1:fa:51:51:94:11:02:1d:bc:f5:d7:b2:04:
                    6f:08:34:ac:b4:bd:15:b0:f2:42:dd:43:98:5e:fb:1c:
                    40:16:a4:23:48:fb:cc:a9:72:19:e8:ee:01:2a:b8:bf:
                    c8:b9:4e:80:f9:7b:28:65:83:80:ae:4c:77:df:11:c3:
                    2a:29:a9:0c:6a:c7:ac:78:ab:5a:bf:e8:46:e9:75:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c4:d0:f7:e0:ca:2c:01:46:b3:61:e1:06:79:ae:d3:44:
        71:fd:73:af:23:c0:67:3b:de:bc:8f:59:24:4d:cd:26:
        d2:1a:99:1f:8a:8d:1a:46:a7:03:d6:6a:51:98:1c:b4:
        06:31:b3:a3:94:39:7b:63:f8:f9:51:0a:d7:9d:e9:8f:
        50:21:a7:93:18:3e:d5:46:8c:61:19:c5:a7:10:07:6f:
        69:de:a6:48:aa:18:bb:de:54:5d:5c:73:60:55:89:03:
        ff:f9:83:d2:53:bd:ef:85:e0:bd:30:e6:64:67:3c:8c:
        8b:81:59:3a:60:cf:b5:f1:ea:4c:87:94:32:c0:29:11
    Fingerprint (MD5):
        68:49:A3:25:16:F8:9B:2A:8D:AA:48:40:BB:95:10:4E
    Fingerprint (SHA1):
        70:DC:56:46:03:AA:B3:77:E8:9B:F5:B2:E0:F0:94:60:A1:A7:01:8A


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #9885: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9886: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9887: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9888: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181091 (0x432f6b23)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:11:58 2012
            Not After : Tue Nov 28 02:11:58 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:d3:b1:83:eb:bc:2c:2a:d7:17:55:a9:45:e0:bd:04:
                    d3:50:89:95:49:23:d1:f7:e5:0a:07:10:ea:77:88:e9:
                    21:b8:c5:68:6f:28:37:d9:68:aa:8d:ea:fe:a9:ad:c3:
                    c5:94:0d:a1:fa:51:51:94:11:02:1d:bc:f5:d7:b2:04:
                    6f:08:34:ac:b4:bd:15:b0:f2:42:dd:43:98:5e:fb:1c:
                    40:16:a4:23:48:fb:cc:a9:72:19:e8:ee:01:2a:b8:bf:
                    c8:b9:4e:80:f9:7b:28:65:83:80:ae:4c:77:df:11:c3:
                    2a:29:a9:0c:6a:c7:ac:78:ab:5a:bf:e8:46:e9:75:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c4:d0:f7:e0:ca:2c:01:46:b3:61:e1:06:79:ae:d3:44:
        71:fd:73:af:23:c0:67:3b:de:bc:8f:59:24:4d:cd:26:
        d2:1a:99:1f:8a:8d:1a:46:a7:03:d6:6a:51:98:1c:b4:
        06:31:b3:a3:94:39:7b:63:f8:f9:51:0a:d7:9d:e9:8f:
        50:21:a7:93:18:3e:d5:46:8c:61:19:c5:a7:10:07:6f:
        69:de:a6:48:aa:18:bb:de:54:5d:5c:73:60:55:89:03:
        ff:f9:83:d2:53:bd:ef:85:e0:bd:30:e6:64:67:3c:8c:
        8b:81:59:3a:60:cf:b5:f1:ea:4c:87:94:32:c0:29:11
    Fingerprint (MD5):
        68:49:A3:25:16:F8:9B:2A:8D:AA:48:40:BB:95:10:4E
    Fingerprint (SHA1):
        70:DC:56:46:03:AA:B3:77:E8:9B:F5:B2:E0:F0:94:60:A1:A7:01:8A

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #9889: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9890: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9891: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9892: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181098 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9893: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9894: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9895: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9896: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127181099   --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #9897: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9898: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9899: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9900: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127181100   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9901: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9902: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9903: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9904: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127181101   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9905: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #9906: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9907: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9908: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9909: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9910: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181098 (0x432f6b2a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:08 2012
            Not After : Tue Nov 28 02:12:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ec:22:13:72:a0:5c:37:d3:20:f9:8b:77:30:62:fc:bf:
                    12:fd:a3:41:69:ce:16:5e:49:a5:4d:66:f4:21:7c:ff:
                    fa:74:c3:e6:6d:95:7d:13:fc:cb:44:10:74:3f:60:4d:
                    d6:da:e4:b6:2f:aa:73:c7:25:ef:ed:87:77:f2:4e:11:
                    5b:83:7b:81:10:d6:3d:c5:e9:34:5d:24:6e:25:d9:a2:
                    30:3a:9e:98:a0:8c:73:a2:be:f2:b3:c4:fa:61:be:8b:
                    2d:e8:0d:03:9d:87:ec:2f:d8:a5:93:fa:a9:0a:62:9c:
                    52:d9:09:ce:dd:84:44:35:d3:4a:5d:42:e1:cc:46:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c2:62:85:8b:f1:dc:fe:9c:27:0c:2f:c7:c1:b9:53:41:
        50:84:e4:5d:5f:01:8b:d3:a9:82:1d:3f:ff:42:e5:e7:
        b0:62:66:10:0d:c0:30:55:eb:43:1e:d2:e9:d4:30:7b:
        0a:b4:94:35:87:be:af:12:5f:dd:2d:f3:53:ae:09:7d:
        93:04:f0:1a:61:c7:5c:52:1c:8a:ae:6a:d6:59:3a:98:
        39:12:cb:a6:13:b9:3d:41:fe:d6:78:99:a7:e1:1a:f4:
        de:90:b5:5f:1b:98:b7:95:2e:75:02:9c:4b:05:f3:7f:
        2b:af:04:b7:db:48:85:43:b8:0d:3a:34:43:00:9b:23
    Fingerprint (MD5):
        BA:50:6F:B3:92:4B:F2:52:DA:AE:A3:13:FB:A4:89:C6
    Fingerprint (SHA1):
        C0:E5:26:A7:CE:5F:19:84:ED:84:3E:DE:C7:5D:40:64:FA:F7:86:B8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9911: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9912: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9913: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181099 (0x432f6b2b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:09 2012
            Not After : Tue Nov 28 02:12:09 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:0c:d7:30:4d:36:be:62:3f:34:50:fd:ec:f3:57:c1:
                    97:a1:39:bd:57:0d:ef:48:b7:e8:2e:17:c5:fb:61:14:
                    95:89:78:6f:54:8f:1d:c8:76:8f:ee:20:e6:b9:8b:2c:
                    08:22:b0:8a:14:5a:35:4f:0c:a4:3c:fe:3a:4a:9c:64:
                    9f:56:01:8b:85:78:e0:1d:25:bc:44:b2:50:11:1b:27:
                    bb:83:10:63:03:88:ef:a2:c8:a3:29:ce:47:5d:e3:73:
                    00:0b:c3:64:49:59:90:27:93:6c:8b:4b:58:1b:fb:3a:
                    39:73:17:6d:ff:68:6b:56:71:3a:d7:6b:09:cb:09:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        47:da:01:9e:b5:75:0c:7c:37:b6:f3:b7:a6:81:73:cd:
        df:45:4f:0a:a5:85:65:c4:0b:76:57:38:0d:07:48:35:
        f4:66:85:8f:b3:a6:e6:67:d2:37:c4:c5:a7:b4:a1:cd:
        b4:c8:b6:4f:bb:06:a8:90:f7:5d:da:91:41:d5:f9:42:
        30:c8:ad:9d:59:b3:4c:7f:c3:10:94:5f:c5:24:7f:0f:
        20:44:5b:1b:ec:ed:8f:9c:a2:8d:bd:9f:4a:38:bd:60:
        7a:7e:2b:59:77:4a:14:d0:67:b9:39:f1:94:6a:64:e6:
        99:2f:ba:aa:fc:ef:8f:66:c6:94:1f:d2:cb:d9:54:71
    Fingerprint (MD5):
        63:8A:7F:49:DD:9B:52:76:16:F6:EA:F6:BF:98:03:83
    Fingerprint (SHA1):
        8B:BC:97:9A:14:9E:E2:AB:EC:51:1D:15:F6:92:07:F4:B7:86:44:C3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9914: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9915: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181100 (0x432f6b2c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:10 2012
            Not After : Tue Nov 28 02:12:10 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:0b:85:b0:96:05:20:f6:e9:0e:54:4a:c7:fa:ad:65:
                    be:b7:46:25:7d:8b:a7:ab:92:53:1c:13:2b:38:86:96:
                    ed:1e:75:fa:bb:82:13:cf:dd:1f:5e:ab:4b:bd:8e:7d:
                    ac:a9:dc:01:d0:43:a6:ba:c9:c7:39:fc:68:b0:33:83:
                    ef:cf:95:fc:54:48:90:c9:33:1c:e6:3c:58:15:c1:aa:
                    c0:05:b6:72:86:dd:9f:c2:6e:0a:ec:e9:59:76:73:ed:
                    42:aa:79:22:60:74:e5:2c:10:71:2e:86:84:65:d5:26:
                    fe:e3:67:84:c1:f0:ac:59:28:2a:52:cc:02:0e:56:c7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c0:12:41:55:e9:91:5f:e3:e9:41:67:ac:64:80:af:f6:
        9c:86:0c:cd:0c:58:35:45:c5:ee:39:4a:83:ee:12:51:
        3c:ea:07:2f:e6:fc:ed:33:a3:d5:64:23:af:cd:46:18:
        35:4e:8b:c4:f9:b9:e7:ba:c6:c7:64:5c:04:fa:d0:bf:
        d5:1a:b3:ae:54:42:b1:10:e1:68:3d:fc:84:fd:ab:f0:
        98:a9:fa:97:31:21:7c:5c:4e:4d:74:90:31:fc:b6:97:
        a9:11:a5:39:38:10:ad:58:74:e0:1a:f5:7b:d7:8f:28:
        59:20:87:f4:bc:cd:c1:0a:72:ec:9a:0f:d4:25:69:a1
    Fingerprint (MD5):
        5C:EE:A2:30:52:32:EA:1E:6D:19:A6:8B:64:0A:66:33
    Fingerprint (SHA1):
        89:C5:A0:0C:F0:98:C2:9F:B4:BB:93:8F:A7:EA:99:D6:89:60:5A:FF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9916: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9917: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181102 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9918: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9919: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9920: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9921: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127181103   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9922: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9923: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9924: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9925: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127181104   --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #9926: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9927: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #9928: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9929: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127181105   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9930: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #9931: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9932: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9933: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127181106   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9934: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #9935: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9936: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9937: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9938: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9939: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #9940: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181102 (0x432f6b2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:15 2012
            Not After : Tue Nov 28 02:12:15 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:3a:7a:7e:e9:e5:1a:34:cc:74:33:33:3f:55:63:e7:
                    f3:34:20:21:b7:cb:22:4d:04:53:93:1d:fa:3c:f1:c4:
                    a3:13:c4:10:aa:01:ca:03:f5:6a:0d:0f:cd:dc:9a:4a:
                    7d:2b:21:db:bd:c9:f7:8e:40:a5:b3:02:3e:19:c1:61:
                    b8:f2:3f:77:ee:13:f9:9f:75:d3:0e:c4:d2:b5:48:ff:
                    7c:df:84:91:42:f7:c5:e5:1c:57:9a:53:77:42:ff:2e:
                    95:45:eb:e1:24:1d:04:e1:38:cf:f1:19:91:4a:8d:70:
                    98:b2:50:52:59:41:10:9f:21:f6:22:39:5a:65:b6:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:8a:e1:92:e9:61:c2:ab:47:17:11:32:26:a8:13:42:
        6a:e6:7f:c7:24:e2:c6:8b:63:0e:c2:11:9e:0f:98:14:
        ab:b2:00:8a:f4:4f:50:bf:6c:d0:1c:b9:e3:0a:01:db:
        1e:de:35:a6:c5:8d:5c:11:5c:dd:55:63:ec:b4:b3:65:
        47:5d:4a:82:af:fc:1b:73:d6:f5:79:b2:25:ee:d9:b5:
        81:c1:1d:55:b8:5b:ce:a5:24:4a:44:8a:25:23:8e:90:
        ce:08:f8:56:19:fd:9a:78:0c:55:fa:ab:ef:28:0d:97:
        19:fa:b9:7f:05:03:9b:ef:a3:fd:6c:f3:50:dc:57:ea
    Fingerprint (MD5):
        9A:13:42:10:D9:B3:99:CB:1E:FE:3D:8B:D0:8B:1E:B5
    Fingerprint (SHA1):
        FF:89:5F:85:18:7A:EE:4C:59:96:BF:E1:A8:21:61:15:2C:6C:25:6B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9941: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9942: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181103 (0x432f6b2f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:16 2012
            Not After : Tue Nov 28 02:12:16 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:8a:9f:3c:5f:3f:1b:39:fb:71:a8:92:32:6e:ed:2c:
                    a9:d3:b0:f8:b4:18:0e:e0:9d:c6:39:53:c2:2a:21:8f:
                    1f:b0:f7:dc:39:e6:cc:a6:6a:16:e6:95:0d:56:78:03:
                    45:6d:51:0d:fe:77:40:24:ca:b4:d1:b4:b2:bf:da:32:
                    06:99:a1:89:81:a5:db:fa:21:06:e1:16:b9:53:e9:a2:
                    00:77:ee:99:12:92:29:13:69:4c:2e:8b:2c:d7:c1:0d:
                    fa:d8:8f:41:a9:0b:f9:29:32:46:5c:0e:b4:98:ed:05:
                    d0:e0:11:0a:5d:24:3d:fd:f7:4b:33:94:c8:ee:53:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        40:eb:31:af:2e:0a:41:f7:1b:46:ba:20:fe:48:9c:a4:
        66:70:c1:4b:16:da:25:38:38:6b:48:d4:33:c3:0f:53:
        e1:ee:fa:52:f3:82:90:ed:46:fb:11:9c:53:5a:ef:78:
        89:92:c4:11:ba:38:6a:8d:15:9a:ba:b6:78:73:e1:97:
        32:ab:b6:a5:8a:8c:de:1f:21:f5:84:67:d2:64:f8:dd:
        09:8d:8f:38:b7:4d:18:99:0c:18:14:01:e1:6c:9b:a7:
        57:91:37:23:3c:fa:17:d5:50:4e:ca:88:56:40:4a:11:
        fa:f6:d8:d3:66:18:1b:c9:39:99:18:2a:7f:09:36:f7
    Fingerprint (MD5):
        53:34:5A:DE:C9:AB:1D:B1:04:15:14:BC:8B:B4:E4:91
    Fingerprint (SHA1):
        42:50:8F:8E:75:FF:52:CB:6C:08:37:88:B0:72:E9:0D:D0:D8:13:55

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9943: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9944: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9945: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181104 (0x432f6b30)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:17 2012
            Not After : Tue Nov 28 02:12:17 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:b0:58:88:c2:3e:62:c8:fb:39:32:74:85:e6:cd:d7:
                    d6:7b:67:58:2c:53:ab:f6:b9:59:f7:36:d5:9b:bb:b0:
                    40:3e:42:08:c8:b1:cf:f1:f6:14:8e:08:3a:d8:8c:79:
                    53:17:b4:63:8d:2d:2f:38:8a:e8:d9:66:dc:94:bb:41:
                    a0:b2:b1:22:74:e0:71:1b:f2:23:92:88:02:b7:b4:3a:
                    2b:bd:2c:e1:8f:8d:15:e3:f6:33:a9:ac:ae:4b:17:23:
                    58:43:8e:41:98:12:e3:16:52:60:9e:dc:e6:da:3a:29:
                    9b:34:bf:67:83:af:5b:4f:bd:d6:aa:82:92:92:9d:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7b:49:03:ed:85:81:42:68:ab:07:e3:c7:cf:0a:50:c4:
        5c:0f:4f:ce:d4:d4:5d:fc:7c:24:48:a0:3c:58:0d:7f:
        de:30:50:52:36:f0:0b:aa:60:7d:a0:6a:9d:dc:70:38:
        2b:bf:7c:94:52:6d:26:c4:04:3a:be:41:be:ce:79:e4:
        3f:43:d5:46:33:d9:0e:96:e9:8a:db:08:8a:76:56:b2:
        9d:4f:62:58:8e:13:8c:49:69:02:03:e8:db:3e:44:7a:
        e3:6e:35:be:09:95:08:98:55:c0:fd:e6:55:3e:ea:14:
        2f:1f:ba:cb:44:f7:2e:57:84:af:da:49:4f:c8:b6:66
    Fingerprint (MD5):
        23:97:9E:71:10:98:9A:D3:6D:D8:82:B7:A8:17:47:08
    Fingerprint (SHA1):
        60:02:A2:7B:20:2C:F5:2F:FF:0B:23:81:B4:F7:F4:E6:EB:FD:D4:96

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #9946: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9947: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181107 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9948: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9949: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9950: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9951: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127181108   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9952: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9953: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9954: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9955: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127181109   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA1Root-1127181017.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #9956: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9957: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9958: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o UserReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9959: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127181110   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9960: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #9961: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #9962: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181107 (0x432f6b33)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:23 2012
            Not After : Tue Nov 28 02:12:23 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:2f:47:97:e6:ac:1a:ba:07:63:fa:e6:62:aa:f1:c9:
                    16:8c:ec:43:fa:ba:8a:5a:a5:7c:51:6e:96:2d:74:60:
                    b5:63:7a:7e:9f:38:b2:34:8e:32:73:cb:3f:00:22:28:
                    05:9b:e1:a1:f3:29:74:ef:42:f3:e1:f5:0d:c0:f3:ed:
                    b5:19:de:3e:86:c8:41:01:5a:09:b2:32:83:12:93:23:
                    c0:a9:03:f0:ba:3a:a8:e6:45:8c:78:0c:44:e9:34:31:
                    d2:dd:3e:81:81:d3:a5:eb:8d:a4:8d:16:d1:2f:82:b1:
                    1c:d2:1f:ad:aa:38:f1:f7:69:7d:b1:1d:ef:f3:80:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        59:29:e7:4d:80:ef:d6:06:cc:23:f4:49:13:82:1a:af:
        a5:52:ef:4c:51:bd:87:f2:b9:74:50:cc:25:16:2d:80:
        12:47:15:bc:55:36:31:42:bf:04:ec:ae:de:e6:86:b2:
        7d:ca:7f:e9:f5:47:27:ab:2c:7e:00:e5:5a:cd:11:c1:
        96:7f:d2:60:ef:87:d2:06:9d:34:56:ef:61:4a:fb:ac:
        02:5d:d7:e5:c7:73:31:cd:de:3e:08:f2:b9:22:62:15:
        8c:7f:19:14:3d:67:b7:21:e9:00:6e:6f:ef:34:64:d3:
        d2:06:90:ed:84:dc:b7:08:14:17:98:68:b2:51:60:33
    Fingerprint (MD5):
        B3:76:26:67:9E:38:C9:E1:DD:40:65:F2:90:34:CD:A0
    Fingerprint (SHA1):
        C8:F8:FB:53:48:4B:50:B8:8A:64:B1:AB:94:73:22:2C:7C:C6:6A:21


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9963: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #9964: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181111 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9965: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #9966: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #9967: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181112 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9968: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #9969: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #9970: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9971: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127181113 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9972: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #9973: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127181114 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9974: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #9975: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #9976: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9977: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9978: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127181115   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-Bridge-1127181018.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #9979: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #9980: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #9981: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9982: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127181116   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9983: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #9984: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9985: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181111 (0x432f6b37)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:28 2012
            Not After : Tue Nov 28 02:12:28 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:5e:15:87:95:b6:05:dd:7f:52:d6:8a:0e:89:90:2d:
                    3c:07:b5:bf:09:d7:2a:b7:7f:9c:8d:ef:89:61:d3:50:
                    ad:2e:ab:7f:61:f3:99:d9:96:72:0e:ce:2d:35:ce:7f:
                    46:18:d9:75:29:ab:f8:ef:92:39:6f:46:be:50:e3:93:
                    fb:07:e7:db:26:00:d7:68:a2:85:bb:e4:4a:35:0c:07:
                    f1:91:24:72:f2:6f:9a:88:1f:66:69:f9:0e:d8:09:f8:
                    97:53:39:5d:ab:57:d8:8b:f9:bd:b4:9c:7f:c1:11:fb:
                    d4:7e:28:85:63:49:59:c5:ee:07:55:42:48:15:bd:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5a:a5:fe:06:b8:8d:d6:90:c4:8f:ad:3d:a7:0e:38:0e:
        2d:fa:56:b8:f7:86:4c:51:90:59:5b:d5:9f:7f:85:d2:
        a1:9d:3f:fb:28:a9:ad:20:e2:56:c9:db:8d:61:11:b5:
        d9:c7:dd:ee:55:48:40:fe:a6:aa:cd:99:7f:09:14:c0:
        da:8f:42:20:61:ea:bc:46:62:93:04:a0:26:1c:4e:92:
        1a:5f:65:39:b8:56:ec:bc:e8:03:93:55:27:ae:5b:2c:
        7d:59:66:e3:9e:6b:f1:3f:b9:81:65:23:d0:bd:1e:9e:
        84:a9:f7:fb:aa:9b:67:20:f2:ee:c4:82:c2:39:2f:f1
    Fingerprint (MD5):
        77:0F:FE:C3:FC:EB:13:19:C0:D4:4F:A7:9A:E3:2B:A9
    Fingerprint (SHA1):
        CF:47:B8:B8:DF:5D:F2:7D:26:CA:AB:F0:18:95:8F:EA:78:2F:B6:45


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9986: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181112 (0x432f6b38)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:29 2012
            Not After : Tue Nov 28 02:12:29 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:ad:7e:8a:1c:eb:2d:b9:eb:b3:59:f4:2c:fe:2d:b6:
                    10:9d:f6:2d:58:85:cb:22:40:dd:b3:92:df:ae:25:ce:
                    7a:a3:8e:fa:c8:d3:14:52:4d:64:b0:f4:ce:20:9a:ee:
                    45:12:9c:ac:4d:b4:7e:0c:42:c1:e8:10:fa:18:e9:b9:
                    8f:1b:05:d7:c2:bd:e1:a7:a9:76:b2:c6:c9:99:e8:e7:
                    f0:65:63:6c:ac:62:ee:b0:34:c8:3c:51:f4:c6:40:6f:
                    79:18:dd:ed:dd:1c:3b:40:7e:c6:b0:7c:e3:fd:0f:c9:
                    7b:fd:e6:47:fd:ba:53:5e:2d:3e:20:cb:d9:54:2f:a5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:d6:39:ea:d7:a2:f7:3d:4d:74:20:41:9e:24:c9:33:
        9d:fa:cb:d5:cd:f1:50:46:88:4c:19:34:b7:e5:39:f6:
        57:ff:b2:82:87:ce:61:99:50:f2:e2:db:a5:89:14:b5:
        e3:dd:ad:99:00:49:d9:cb:10:c5:cf:60:f6:74:da:2b:
        4c:df:66:05:88:12:d9:6f:b3:63:dc:3c:33:5b:d7:3a:
        39:05:68:65:8d:96:c5:12:20:2d:53:fd:1d:9c:cd:f2:
        84:71:94:89:e8:a5:51:82:48:d0:c1:a3:ad:90:f9:eb:
        21:d3:95:15:ad:d7:07:a2:4d:ad:b3:ce:35:f7:ed:3b
    Fingerprint (MD5):
        CD:02:0B:E6:8E:FA:E6:ED:E4:C4:25:84:A8:24:32:A7
    Fingerprint (SHA1):
        15:58:E9:D4:50:2D:E5:CD:13:1B:CD:D1:98:ED:3B:2E:55:D0:58:AC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9987: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181112 (0x432f6b38)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:29 2012
            Not After : Tue Nov 28 02:12:29 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:ad:7e:8a:1c:eb:2d:b9:eb:b3:59:f4:2c:fe:2d:b6:
                    10:9d:f6:2d:58:85:cb:22:40:dd:b3:92:df:ae:25:ce:
                    7a:a3:8e:fa:c8:d3:14:52:4d:64:b0:f4:ce:20:9a:ee:
                    45:12:9c:ac:4d:b4:7e:0c:42:c1:e8:10:fa:18:e9:b9:
                    8f:1b:05:d7:c2:bd:e1:a7:a9:76:b2:c6:c9:99:e8:e7:
                    f0:65:63:6c:ac:62:ee:b0:34:c8:3c:51:f4:c6:40:6f:
                    79:18:dd:ed:dd:1c:3b:40:7e:c6:b0:7c:e3:fd:0f:c9:
                    7b:fd:e6:47:fd:ba:53:5e:2d:3e:20:cb:d9:54:2f:a5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:d6:39:ea:d7:a2:f7:3d:4d:74:20:41:9e:24:c9:33:
        9d:fa:cb:d5:cd:f1:50:46:88:4c:19:34:b7:e5:39:f6:
        57:ff:b2:82:87:ce:61:99:50:f2:e2:db:a5:89:14:b5:
        e3:dd:ad:99:00:49:d9:cb:10:c5:cf:60:f6:74:da:2b:
        4c:df:66:05:88:12:d9:6f:b3:63:dc:3c:33:5b:d7:3a:
        39:05:68:65:8d:96:c5:12:20:2d:53:fd:1d:9c:cd:f2:
        84:71:94:89:e8:a5:51:82:48:d0:c1:a3:ad:90:f9:eb:
        21:d3:95:15:ad:d7:07:a2:4d:ad:b3:ce:35:f7:ed:3b
    Fingerprint (MD5):
        CD:02:0B:E6:8E:FA:E6:ED:E4:C4:25:84:A8:24:32:A7
    Fingerprint (SHA1):
        15:58:E9:D4:50:2D:E5:CD:13:1B:CD:D1:98:ED:3B:2E:55:D0:58:AC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9988: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #9989: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181117 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9990: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #9991: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #9992: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181118 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9993: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #9994: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #9995: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9996: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127181119 -7 Bridge@Army  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9997: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #9998: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127181120 -7 Bridge@Navy  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9999: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #10000: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #10001: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10002: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10003: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127181121   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-Bridge-1127181019.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10004: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10005: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10006: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10007: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127181122   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10008: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10009: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10010: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10011: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127181123   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-BridgeNavy-1127181020.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10012: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #10013: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10014: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10015: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127181124   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10016: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10017: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #10018: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181117 (0x432f6b3d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:35 2012
            Not After : Tue Nov 28 02:12:35 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:f5:7c:b8:f7:17:62:76:00:84:ed:88:a2:73:ab:85:
                    6c:4f:c0:d8:2c:2c:a5:5c:0f:6b:7b:33:bb:e3:17:b3:
                    76:16:45:50:11:35:5e:91:e1:f1:30:b1:7b:1b:2f:21:
                    e5:63:04:e0:b5:32:74:62:9f:85:e1:f4:69:f8:0e:0c:
                    6b:ff:28:66:fa:ce:e4:c0:25:6e:12:f8:bb:f5:79:c9:
                    e4:fb:ce:0c:e6:44:74:6e:7d:e1:70:52:ee:bd:c6:4f:
                    8f:2f:ec:14:3c:fe:9f:7b:50:4b:b2:a1:8e:5d:3c:05:
                    85:88:00:fa:da:b3:9c:b0:86:4d:48:01:ec:08:22:51
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        38:d2:c0:4c:83:b3:36:98:ee:88:5f:40:0c:06:bd:c5:
        f9:16:12:e5:e3:b4:b4:a0:ce:40:d2:b0:15:b7:80:81:
        ed:ac:a3:66:90:dd:6b:97:79:d6:b3:0f:3c:e5:07:06:
        e6:2f:95:2c:d8:07:96:8b:8d:dd:f0:bc:b8:4a:fd:5f:
        7f:19:4d:7e:ba:cb:d5:4e:97:88:a1:1d:51:de:2f:53:
        cc:fb:19:be:cc:7f:5d:17:ac:4f:7b:7f:03:79:70:0b:
        d4:cc:5e:cf:a8:d6:30:9c:ef:e5:31:4d:cb:7a:e4:26:
        97:21:71:19:73:4f:4d:bd:4c:0a:ce:2d:12:5b:b7:8c
    Fingerprint (MD5):
        6D:4F:8A:E0:71:20:AD:16:2D:44:2D:A7:16:14:6F:64
    Fingerprint (SHA1):
        8B:07:3C:D5:B1:6B:E2:66:3E:B7:2E:78:F4:EC:CD:D2:3B:A0:FD:62


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10019: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181118 (0x432f6b3e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:35 2012
            Not After : Tue Nov 28 02:12:35 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:7f:ac:6f:e3:23:9e:50:fb:a7:38:3a:6c:83:c9:86:
                    aa:10:ab:02:b2:26:86:54:e4:c1:76:2d:7d:0c:88:d0:
                    8b:e2:77:1c:6a:61:b6:5b:00:71:64:5c:fd:5e:43:51:
                    3d:af:4b:27:61:d0:40:9a:85:06:a6:ab:a4:dc:39:fd:
                    c4:30:16:59:9e:1d:68:e4:37:b6:4f:0f:10:27:a1:2c:
                    8b:0f:55:2e:00:0f:3c:49:4f:c6:37:01:10:c7:f8:18:
                    45:f6:dd:02:92:44:a2:ab:be:91:53:7c:50:73:49:36:
                    26:20:a4:96:4b:ab:71:a8:03:90:b1:6f:4e:5a:72:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:eb:ac:9f:54:f9:51:9b:d4:91:32:b7:d4:da:d4:9f:
        38:51:62:bb:dd:48:6a:db:fb:16:4d:64:39:b3:d4:e3:
        b9:dd:ab:db:f0:cf:b3:c9:61:18:db:ca:cb:5e:e5:68:
        b1:6b:46:2e:9c:fa:21:fd:b8:be:24:2e:bd:d3:0c:26:
        c2:69:e1:60:2b:a0:d5:93:22:3e:a9:c4:c2:7c:59:f1:
        15:8b:18:94:e9:d5:39:70:0d:4b:58:0e:ec:0c:b3:ae:
        8f:a6:24:8a:7c:47:c3:78:d4:90:2f:12:7c:dc:76:8a:
        31:7f:62:9e:98:b0:36:84:77:1c:2d:b3:36:f4:fa:99
    Fingerprint (MD5):
        B9:38:33:85:6D:9A:CB:52:8C:3B:8A:82:7D:11:CE:A6
    Fingerprint (SHA1):
        CD:92:76:4A:A3:93:28:0C:DB:B3:E6:79:A7:B5:2D:23:9B:79:77:35


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10020: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181118 (0x432f6b3e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:35 2012
            Not After : Tue Nov 28 02:12:35 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:7f:ac:6f:e3:23:9e:50:fb:a7:38:3a:6c:83:c9:86:
                    aa:10:ab:02:b2:26:86:54:e4:c1:76:2d:7d:0c:88:d0:
                    8b:e2:77:1c:6a:61:b6:5b:00:71:64:5c:fd:5e:43:51:
                    3d:af:4b:27:61:d0:40:9a:85:06:a6:ab:a4:dc:39:fd:
                    c4:30:16:59:9e:1d:68:e4:37:b6:4f:0f:10:27:a1:2c:
                    8b:0f:55:2e:00:0f:3c:49:4f:c6:37:01:10:c7:f8:18:
                    45:f6:dd:02:92:44:a2:ab:be:91:53:7c:50:73:49:36:
                    26:20:a4:96:4b:ab:71:a8:03:90:b1:6f:4e:5a:72:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:eb:ac:9f:54:f9:51:9b:d4:91:32:b7:d4:da:d4:9f:
        38:51:62:bb:dd:48:6a:db:fb:16:4d:64:39:b3:d4:e3:
        b9:dd:ab:db:f0:cf:b3:c9:61:18:db:ca:cb:5e:e5:68:
        b1:6b:46:2e:9c:fa:21:fd:b8:be:24:2e:bd:d3:0c:26:
        c2:69:e1:60:2b:a0:d5:93:22:3e:a9:c4:c2:7c:59:f1:
        15:8b:18:94:e9:d5:39:70:0d:4b:58:0e:ec:0c:b3:ae:
        8f:a6:24:8a:7c:47:c3:78:d4:90:2f:12:7c:dc:76:8a:
        31:7f:62:9e:98:b0:36:84:77:1c:2d:b3:36:f4:fa:99
    Fingerprint (MD5):
        B9:38:33:85:6D:9A:CB:52:8C:3B:8A:82:7D:11:CE:A6
    Fingerprint (SHA1):
        CD:92:76:4A:A3:93:28:0C:DB:B3:E6:79:A7:B5:2D:23:9B:79:77:35


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10021: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #10022: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181117 (0x432f6b3d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:35 2012
            Not After : Tue Nov 28 02:12:35 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:f5:7c:b8:f7:17:62:76:00:84:ed:88:a2:73:ab:85:
                    6c:4f:c0:d8:2c:2c:a5:5c:0f:6b:7b:33:bb:e3:17:b3:
                    76:16:45:50:11:35:5e:91:e1:f1:30:b1:7b:1b:2f:21:
                    e5:63:04:e0:b5:32:74:62:9f:85:e1:f4:69:f8:0e:0c:
                    6b:ff:28:66:fa:ce:e4:c0:25:6e:12:f8:bb:f5:79:c9:
                    e4:fb:ce:0c:e6:44:74:6e:7d:e1:70:52:ee:bd:c6:4f:
                    8f:2f:ec:14:3c:fe:9f:7b:50:4b:b2:a1:8e:5d:3c:05:
                    85:88:00:fa:da:b3:9c:b0:86:4d:48:01:ec:08:22:51
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        38:d2:c0:4c:83:b3:36:98:ee:88:5f:40:0c:06:bd:c5:
        f9:16:12:e5:e3:b4:b4:a0:ce:40:d2:b0:15:b7:80:81:
        ed:ac:a3:66:90:dd:6b:97:79:d6:b3:0f:3c:e5:07:06:
        e6:2f:95:2c:d8:07:96:8b:8d:dd:f0:bc:b8:4a:fd:5f:
        7f:19:4d:7e:ba:cb:d5:4e:97:88:a1:1d:51:de:2f:53:
        cc:fb:19:be:cc:7f:5d:17:ac:4f:7b:7f:03:79:70:0b:
        d4:cc:5e:cf:a8:d6:30:9c:ef:e5:31:4d:cb:7a:e4:26:
        97:21:71:19:73:4f:4d:bd:4c:0a:ce:2d:12:5b:b7:8c
    Fingerprint (MD5):
        6D:4F:8A:E0:71:20:AD:16:2D:44:2D:A7:16:14:6F:64
    Fingerprint (SHA1):
        8B:07:3C:D5:B1:6B:E2:66:3E:B7:2E:78:F4:EC:CD:D2:3B:A0:FD:62


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10023: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181118 (0x432f6b3e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:35 2012
            Not After : Tue Nov 28 02:12:35 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:7f:ac:6f:e3:23:9e:50:fb:a7:38:3a:6c:83:c9:86:
                    aa:10:ab:02:b2:26:86:54:e4:c1:76:2d:7d:0c:88:d0:
                    8b:e2:77:1c:6a:61:b6:5b:00:71:64:5c:fd:5e:43:51:
                    3d:af:4b:27:61:d0:40:9a:85:06:a6:ab:a4:dc:39:fd:
                    c4:30:16:59:9e:1d:68:e4:37:b6:4f:0f:10:27:a1:2c:
                    8b:0f:55:2e:00:0f:3c:49:4f:c6:37:01:10:c7:f8:18:
                    45:f6:dd:02:92:44:a2:ab:be:91:53:7c:50:73:49:36:
                    26:20:a4:96:4b:ab:71:a8:03:90:b1:6f:4e:5a:72:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:eb:ac:9f:54:f9:51:9b:d4:91:32:b7:d4:da:d4:9f:
        38:51:62:bb:dd:48:6a:db:fb:16:4d:64:39:b3:d4:e3:
        b9:dd:ab:db:f0:cf:b3:c9:61:18:db:ca:cb:5e:e5:68:
        b1:6b:46:2e:9c:fa:21:fd:b8:be:24:2e:bd:d3:0c:26:
        c2:69:e1:60:2b:a0:d5:93:22:3e:a9:c4:c2:7c:59:f1:
        15:8b:18:94:e9:d5:39:70:0d:4b:58:0e:ec:0c:b3:ae:
        8f:a6:24:8a:7c:47:c3:78:d4:90:2f:12:7c:dc:76:8a:
        31:7f:62:9e:98:b0:36:84:77:1c:2d:b3:36:f4:fa:99
    Fingerprint (MD5):
        B9:38:33:85:6D:9A:CB:52:8C:3B:8A:82:7D:11:CE:A6
    Fingerprint (SHA1):
        CD:92:76:4A:A3:93:28:0C:DB:B3:E6:79:A7:B5:2D:23:9B:79:77:35


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10024: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181118 (0x432f6b3e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:35 2012
            Not After : Tue Nov 28 02:12:35 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:7f:ac:6f:e3:23:9e:50:fb:a7:38:3a:6c:83:c9:86:
                    aa:10:ab:02:b2:26:86:54:e4:c1:76:2d:7d:0c:88:d0:
                    8b:e2:77:1c:6a:61:b6:5b:00:71:64:5c:fd:5e:43:51:
                    3d:af:4b:27:61:d0:40:9a:85:06:a6:ab:a4:dc:39:fd:
                    c4:30:16:59:9e:1d:68:e4:37:b6:4f:0f:10:27:a1:2c:
                    8b:0f:55:2e:00:0f:3c:49:4f:c6:37:01:10:c7:f8:18:
                    45:f6:dd:02:92:44:a2:ab:be:91:53:7c:50:73:49:36:
                    26:20:a4:96:4b:ab:71:a8:03:90:b1:6f:4e:5a:72:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:eb:ac:9f:54:f9:51:9b:d4:91:32:b7:d4:da:d4:9f:
        38:51:62:bb:dd:48:6a:db:fb:16:4d:64:39:b3:d4:e3:
        b9:dd:ab:db:f0:cf:b3:c9:61:18:db:ca:cb:5e:e5:68:
        b1:6b:46:2e:9c:fa:21:fd:b8:be:24:2e:bd:d3:0c:26:
        c2:69:e1:60:2b:a0:d5:93:22:3e:a9:c4:c2:7c:59:f1:
        15:8b:18:94:e9:d5:39:70:0d:4b:58:0e:ec:0c:b3:ae:
        8f:a6:24:8a:7c:47:c3:78:d4:90:2f:12:7c:dc:76:8a:
        31:7f:62:9e:98:b0:36:84:77:1c:2d:b3:36:f4:fa:99
    Fingerprint (MD5):
        B9:38:33:85:6D:9A:CB:52:8C:3B:8A:82:7D:11:CE:A6
    Fingerprint (SHA1):
        CD:92:76:4A:A3:93:28:0C:DB:B3:E6:79:A7:B5:2D:23:9B:79:77:35


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10025: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10026: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181125 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10027: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10028: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10029: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181126 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10030: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10031: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #10032: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CAArmyReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10033: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127181127   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10034: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #10035: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #10036: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CANavyReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10037: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127181128   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10038: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #10039: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10040: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o BridgeReq.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10041: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127181129 -7 Bridge@CAArmy  --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10042: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #10043: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127181130 -7 Bridge@CANavy  --extCP --extPM < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10044: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #10045: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #10046: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10047: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10048: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127181131   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10049: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10050: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10051: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10052: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127181132   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10053: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #10054: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10055: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10056: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127181133   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10057: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10058: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10059: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10060: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127181134   --extCP < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10061: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10062: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10063: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181125 (0x432f6b45)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:45 2012
            Not After : Tue Nov 28 02:12:45 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:d9:bb:2a:32:9f:8b:68:65:aa:8c:0b:61:7f:14:50:
                    a5:b5:5c:18:73:8a:7e:51:4a:41:aa:a7:ac:02:e5:e3:
                    8d:56:46:c7:38:df:2a:17:1e:10:aa:b0:95:f4:a5:7d:
                    6d:55:30:32:74:d1:09:7f:6f:d1:b5:86:b0:38:3f:b9:
                    19:55:b0:69:36:d2:cb:86:b7:d6:8b:44:6a:5f:e7:dd:
                    01:1c:ff:68:5d:54:42:60:d2:14:87:9b:e7:46:e6:b0:
                    31:67:8f:36:17:48:8e:c7:7a:e3:51:d3:15:a4:c4:91:
                    3c:1b:7b:7e:3b:7f:22:c2:4b:d3:d0:2d:e6:f0:1f:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:5f:b2:37:47:1e:f5:58:8d:0c:a1:48:69:bb:02:ea:
        c4:f8:70:19:0b:8f:14:98:74:fc:32:e4:7d:15:91:46:
        0b:4f:9e:9b:3e:f0:8c:2f:7e:3b:25:7b:7b:e6:7d:b9:
        bd:34:62:35:b5:cc:3d:4a:e2:67:07:03:bd:04:5c:30:
        f1:fd:eb:c7:5c:6e:39:a4:7c:0c:67:a4:b0:8c:46:76:
        ff:13:a6:3e:01:57:e7:01:c4:96:74:ec:bc:b7:23:44:
        c1:83:ff:99:83:13:d2:64:d9:eb:01:c7:e5:14:4f:6d:
        9e:5f:99:09:c4:7e:c1:c5:40:11:d5:e0:d9:d5:e4:6f
    Fingerprint (MD5):
        57:7B:24:CC:5B:74:F0:11:31:7F:19:73:4A:0B:CE:FB
    Fingerprint (SHA1):
        EB:7A:71:1C:14:B3:6F:BC:16:16:BC:3F:3C:63:02:5A:E0:DD:67:FB


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #10064: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10065: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10066: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10067: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10068: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10069: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10070: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10071: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10072: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181126 (0x432f6b46)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 02:12:46 2012
            Not After : Tue Nov 28 02:12:46 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ed:86:82:06:a7:d6:3f:99:4a:90:7b:e0:4a:ee:a5:c2:
                    55:bc:bf:f7:ac:93:65:cd:e7:69:2f:f1:c8:18:a3:27:
                    56:26:a0:60:12:b9:2e:8b:67:e5:51:4d:ac:77:78:b4:
                    bf:b4:1f:dd:12:5d:f5:d6:f1:4f:ec:85:c5:37:41:1a:
                    b6:4b:6d:1f:6f:5b:04:42:4c:da:ff:46:08:38:69:38:
                    f0:33:e0:b5:ab:6f:2d:7e:7b:30:f4:35:9d:05:d4:35:
                    21:7a:11:be:46:76:ac:1b:23:40:6a:2f:68:b8:a9:a5:
                    e2:a1:6f:6e:88:ab:b7:68:ee:b4:83:d8:ad:58:a0:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ed:3c:bd:ff:c5:49:bc:2d:72:10:87:58:6b:7c:34:4b:
        49:16:7d:67:3a:1e:79:24:2b:10:f7:0f:2f:4f:da:07:
        3c:9a:b6:78:1c:8a:ea:1a:5e:8e:69:6a:5b:8f:3a:97:
        df:8e:94:a3:75:81:c7:7b:c7:ad:78:8d:9f:14:11:63:
        76:1a:26:bc:62:e1:ad:87:4e:be:2f:2d:64:a5:60:fa:
        ab:b3:39:68:e2:3b:36:dd:eb:30:1a:b8:ba:11:75:0e:
        6f:36:db:83:b3:e9:b4:74:88:0e:30:2e:c2:30:76:2a:
        4b:5e:75:ec:24:e3:f9:62:52:d0:9f:65:1e:ca:c9:dc
    Fingerprint (MD5):
        EC:E6:2C:56:47:C8:76:D7:76:9A:8A:C3:2D:7B:97:A7
    Fingerprint (SHA1):
        E8:74:C2:EF:E8:F8:41:78:FC:79:D4:71:67:6A:B5:50:B8:B5:6B:B2


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #10073: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10074: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10075: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10076: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10077: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10078: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10079: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #10080: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #10081: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #10082: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #10083: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #10084: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #10085: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #10086: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #10087: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #10088: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #10089: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #10090: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10091: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181135 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10092: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10093: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10094: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10095: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127181136   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10096: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10097: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10098: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10099: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127181137   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10100: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10101: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10102: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10103: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127181138   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10104: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #10105: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10106: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10107: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127181139   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10108: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10109: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #10110: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10111: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127181140   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10112: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #10113: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #10114: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE3Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10115: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127181141   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10116: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #10117: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #10118: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10119: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127181142   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10120: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #10121: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #10122: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE4Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10123: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127181143   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10124: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #10125: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10126: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181135 (0x432f6b4f)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:01 2012
            Not After : Tue Nov 28 02:13:01 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    91:93:82:62:e1:b9:5a:5b:a4:cc:3b:a8:2d:ba:e7:c0:
                    e3:cc:e4:43:ca:03:13:9c:0c:1b:8a:45:f6:53:46:7b:
                    ef:b8:14:85:f3:9b:6d:9b:30:7b:e0:6e:7d:64:fc:49:
                    b1:ae:2a:6d:f4:05:04:58:d1:7f:d9:e2:99:cb:29:3c:
                    d3:f5:37:21:ad:77:7f:54:2b:99:7d:53:01:c8:b0:37:
                    4d:f5:40:56:1e:3d:d4:98:9a:fa:cf:74:e6:36:7f:72:
                    56:15:e7:5b:ff:d2:a4:f1:a5:e9:8f:d0:9f:13:77:3a:
                    84:9f:c8:d1:40:a9:91:93:18:95:03:60:63:78:1d:19
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:40:bf:c9:a5:21:e7:bb:2e:a8:5c:7a:8d:
        a1:0c:aa:e9:d9:5d:92:04:02:15:00:93:3c:5e:e0:ff:
        44:ce:08:f3:12:92:f2:7f:fb:d0:82:9f:8c:60:53
    Fingerprint (MD5):
        69:95:61:57:F3:61:CA:E9:66:21:66:17:26:22:D4:90
    Fingerprint (SHA1):
        DF:D6:72:61:1A:61:4C:73:96:6A:D4:5D:58:39:1C:24:3D:C0:7B:41


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10127: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181135 (0x432f6b4f)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:01 2012
            Not After : Tue Nov 28 02:13:01 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    91:93:82:62:e1:b9:5a:5b:a4:cc:3b:a8:2d:ba:e7:c0:
                    e3:cc:e4:43:ca:03:13:9c:0c:1b:8a:45:f6:53:46:7b:
                    ef:b8:14:85:f3:9b:6d:9b:30:7b:e0:6e:7d:64:fc:49:
                    b1:ae:2a:6d:f4:05:04:58:d1:7f:d9:e2:99:cb:29:3c:
                    d3:f5:37:21:ad:77:7f:54:2b:99:7d:53:01:c8:b0:37:
                    4d:f5:40:56:1e:3d:d4:98:9a:fa:cf:74:e6:36:7f:72:
                    56:15:e7:5b:ff:d2:a4:f1:a5:e9:8f:d0:9f:13:77:3a:
                    84:9f:c8:d1:40:a9:91:93:18:95:03:60:63:78:1d:19
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:40:bf:c9:a5:21:e7:bb:2e:a8:5c:7a:8d:
        a1:0c:aa:e9:d9:5d:92:04:02:15:00:93:3c:5e:e0:ff:
        44:ce:08:f3:12:92:f2:7f:fb:d0:82:9f:8c:60:53
    Fingerprint (MD5):
        69:95:61:57:F3:61:CA:E9:66:21:66:17:26:22:D4:90
    Fingerprint (SHA1):
        DF:D6:72:61:1A:61:4C:73:96:6A:D4:5D:58:39:1C:24:3D:C0:7B:41


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10128: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181135 (0x432f6b4f)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:01 2012
            Not After : Tue Nov 28 02:13:01 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    91:93:82:62:e1:b9:5a:5b:a4:cc:3b:a8:2d:ba:e7:c0:
                    e3:cc:e4:43:ca:03:13:9c:0c:1b:8a:45:f6:53:46:7b:
                    ef:b8:14:85:f3:9b:6d:9b:30:7b:e0:6e:7d:64:fc:49:
                    b1:ae:2a:6d:f4:05:04:58:d1:7f:d9:e2:99:cb:29:3c:
                    d3:f5:37:21:ad:77:7f:54:2b:99:7d:53:01:c8:b0:37:
                    4d:f5:40:56:1e:3d:d4:98:9a:fa:cf:74:e6:36:7f:72:
                    56:15:e7:5b:ff:d2:a4:f1:a5:e9:8f:d0:9f:13:77:3a:
                    84:9f:c8:d1:40:a9:91:93:18:95:03:60:63:78:1d:19
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:40:bf:c9:a5:21:e7:bb:2e:a8:5c:7a:8d:
        a1:0c:aa:e9:d9:5d:92:04:02:15:00:93:3c:5e:e0:ff:
        44:ce:08:f3:12:92:f2:7f:fb:d0:82:9f:8c:60:53
    Fingerprint (MD5):
        69:95:61:57:F3:61:CA:E9:66:21:66:17:26:22:D4:90
    Fingerprint (SHA1):
        DF:D6:72:61:1A:61:4C:73:96:6A:D4:5D:58:39:1C:24:3D:C0:7B:41


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10129: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181135 (0x432f6b4f)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:01 2012
            Not After : Tue Nov 28 02:13:01 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    91:93:82:62:e1:b9:5a:5b:a4:cc:3b:a8:2d:ba:e7:c0:
                    e3:cc:e4:43:ca:03:13:9c:0c:1b:8a:45:f6:53:46:7b:
                    ef:b8:14:85:f3:9b:6d:9b:30:7b:e0:6e:7d:64:fc:49:
                    b1:ae:2a:6d:f4:05:04:58:d1:7f:d9:e2:99:cb:29:3c:
                    d3:f5:37:21:ad:77:7f:54:2b:99:7d:53:01:c8:b0:37:
                    4d:f5:40:56:1e:3d:d4:98:9a:fa:cf:74:e6:36:7f:72:
                    56:15:e7:5b:ff:d2:a4:f1:a5:e9:8f:d0:9f:13:77:3a:
                    84:9f:c8:d1:40:a9:91:93:18:95:03:60:63:78:1d:19
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:40:bf:c9:a5:21:e7:bb:2e:a8:5c:7a:8d:
        a1:0c:aa:e9:d9:5d:92:04:02:15:00:93:3c:5e:e0:ff:
        44:ce:08:f3:12:92:f2:7f:fb:d0:82:9f:8c:60:53
    Fingerprint (MD5):
        69:95:61:57:F3:61:CA:E9:66:21:66:17:26:22:D4:90
    Fingerprint (SHA1):
        DF:D6:72:61:1A:61:4C:73:96:6A:D4:5D:58:39:1C:24:3D:C0:7B:41


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #10130: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10131: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 10 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10132: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10133: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #10134: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA0Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10135: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10136: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #10137: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10138: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10139: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10140: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #10141: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #10142: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE11Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10143: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10144: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #10145: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #10146: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE12Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10147: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10148: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #10149: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10150: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10151: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10152: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #10153: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #10154: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10155: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10156: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #10157: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128021320Z
nextupdate=20131128021320Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 02:13:20 2012
    Next Update: Thu Nov 28 02:13:20 2013
    CRL Extensions:
chains.sh: #10158: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128021320Z
nextupdate=20131128021320Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 02:13:20 2012
    Next Update: Thu Nov 28 02:13:20 2013
    CRL Extensions:
chains.sh: #10159: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128021320Z
nextupdate=20131128021320Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 02:13:20 2012
    Next Update: Thu Nov 28 02:13:20 2013
    CRL Extensions:
chains.sh: #10160: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128021320Z
nextupdate=20131128021320Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 02:13:20 2012
    Next Update: Thu Nov 28 02:13:20 2013
    CRL Extensions:
chains.sh: #10161: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128021321Z
addcert 14 20121128021321Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 02:13:21 2012
    Next Update: Thu Nov 28 02:13:20 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 02:13:21 2012
    CRL Extensions:
chains.sh: #10162: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128021322Z
addcert 15 20121128021322Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 02:13:22 2012
    Next Update: Thu Nov 28 02:13:20 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 02:13:22 2012
    CRL Extensions:
chains.sh: #10163: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10164: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10165: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #10166: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #10167: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #10168: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #10169: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #10170: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #10171: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #10172: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:13 2012
            Not After : Tue Nov 28 02:13:13 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:9f:94:4a:85:20:2c:93:fb:8c:5e:bc:7f:c7:94:8e:
                    5e:c1:33:02:b3:50:ae:8f:fb:c5:38:4b:dc:ce:48:98:
                    8d:32:07:ea:fa:86:01:ef:cf:0f:7b:d0:32:86:6c:81:
                    b1:ff:ef:79:63:c9:1e:0a:02:f3:2f:6c:6d:c6:26:75:
                    11:56:17:a7:ba:a5:d4:45:c6:fa:de:f8:be:98:fe:3f:
                    9a:97:7d:62:ec:95:0d:1f:b6:e5:c9:eb:57:59:45:4d:
                    f4:3d:ef:f4:5d:d2:d3:29:fe:fe:4a:6d:8d:17:bf:9a:
                    47:e0:99:0b:62:44:3c:01:3a:cd:4c:b7:96:b3:85:cd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:20:a8:1b:36:0f:38:fe:32:3d:23:44:71:26:76:9f:
        0c:55:46:69:36:08:43:37:d1:65:30:3c:33:5a:12:7a:
        b9:72:ca:78:8a:4d:89:40:ab:80:e8:c0:39:d6:cf:6f:
        df:8a:fd:2c:99:59:5c:88:d4:ae:0e:9c:9b:07:16:53:
        cb:d2:5e:a2:a6:c3:19:67:da:28:fb:02:f9:50:3f:7e:
        f9:00:59:f5:f8:37:80:11:59:74:f0:00:b4:00:ad:43:
        e1:bc:fc:6d:b5:b4:a0:e0:9a:26:8e:09:77:91:6e:94:
        30:35:ec:8f:ac:98:81:03:ca:fc:70:b7:70:9e:bc:2d
    Fingerprint (MD5):
        96:72:00:49:C0:4C:27:9D:2E:A4:1B:29:8B:6C:7C:6E
    Fingerprint (SHA1):
        D3:09:88:96:16:45:32:6A:A9:18:0D:5B:05:D0:DE:40:FA:69:04:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10173: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10174: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:13 2012
            Not After : Tue Nov 28 02:13:13 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:9f:94:4a:85:20:2c:93:fb:8c:5e:bc:7f:c7:94:8e:
                    5e:c1:33:02:b3:50:ae:8f:fb:c5:38:4b:dc:ce:48:98:
                    8d:32:07:ea:fa:86:01:ef:cf:0f:7b:d0:32:86:6c:81:
                    b1:ff:ef:79:63:c9:1e:0a:02:f3:2f:6c:6d:c6:26:75:
                    11:56:17:a7:ba:a5:d4:45:c6:fa:de:f8:be:98:fe:3f:
                    9a:97:7d:62:ec:95:0d:1f:b6:e5:c9:eb:57:59:45:4d:
                    f4:3d:ef:f4:5d:d2:d3:29:fe:fe:4a:6d:8d:17:bf:9a:
                    47:e0:99:0b:62:44:3c:01:3a:cd:4c:b7:96:b3:85:cd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:20:a8:1b:36:0f:38:fe:32:3d:23:44:71:26:76:9f:
        0c:55:46:69:36:08:43:37:d1:65:30:3c:33:5a:12:7a:
        b9:72:ca:78:8a:4d:89:40:ab:80:e8:c0:39:d6:cf:6f:
        df:8a:fd:2c:99:59:5c:88:d4:ae:0e:9c:9b:07:16:53:
        cb:d2:5e:a2:a6:c3:19:67:da:28:fb:02:f9:50:3f:7e:
        f9:00:59:f5:f8:37:80:11:59:74:f0:00:b4:00:ad:43:
        e1:bc:fc:6d:b5:b4:a0:e0:9a:26:8e:09:77:91:6e:94:
        30:35:ec:8f:ac:98:81:03:ca:fc:70:b7:70:9e:bc:2d
    Fingerprint (MD5):
        96:72:00:49:C0:4C:27:9D:2E:A4:1B:29:8B:6C:7C:6E
    Fingerprint (SHA1):
        D3:09:88:96:16:45:32:6A:A9:18:0D:5B:05:D0:DE:40:FA:69:04:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10175: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10176: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #10177: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #10178: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10179: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #10180: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/dist/Darwin9.8.0_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #10181: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128021327Z
nextupdate=20131128021327Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 02:13:27 2012
    Next Update: Thu Nov 28 02:13:27 2013
    CRL Extensions:
chains.sh: #10182: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128021328Z
addcert 3 20121128021328Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 02:13:28 2012
    Next Update: Thu Nov 28 02:13:27 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 02:13:28 2012
    CRL Extensions:
chains.sh: #10183: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128021329Z
addcert 4 20121128021329Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 02:13:29 2012
    Next Update: Thu Nov 28 02:13:27 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 02:13:29 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 02:13:28 2012
    CRL Extensions:
chains.sh: #10184: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10185: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10186: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10187: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10188: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10189: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10190: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10191: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10192: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10193: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10194: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10195: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #10196: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10197: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #10198: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #10199: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10200: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10201: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #10202: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10203: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10204: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10205: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -m 1127181144 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10206: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10207: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #10208: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA0Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10209: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127181145   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10210: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #10211: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10212: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA1Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127181034.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10213: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127181021.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10214: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #10215: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #10216: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE11Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127181034.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10217: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127181146   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10218: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #10219: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10220: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o CA2Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127181034.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10221: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127181022.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10222: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #10223: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #10224: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE21Req.der  < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10225: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127181147   < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10226: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #10227: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10228: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE1Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127181034.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10229: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127181023.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10230: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #10231: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10232: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/tests_noise -o EE2Req.der  -4 < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0-1127181034.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10233: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /Users/tinderbox/mozilla/security/tinderlight/data/nss-vm-darwin9-1_trunk_32_OPT/mozilla/tests_results/security/nss-vm-darwin9-1.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://nss-vm-darwin9-1.community.scl3.mozilla.com:8556/nss-vm-darwin9-1-64867-CA0Root-1127181024.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10234: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #10235: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128021351Z
nextupdate=20131128021351Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 02:13:51 2012
    Next Update: Thu Nov 28 02:13:51 2013
    CRL Extensions:
chains.sh: #10236: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128021351Z
nextupdate=20131128021351Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 02:13:51 2012
    Next Update: Thu Nov 28 02:13:51 2013
    CRL Extensions:
chains.sh: #10237: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128021351Z
nextupdate=20131128021351Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 02:13:51 2012
    Next Update: Thu Nov 28 02:13:51 2013
    CRL Extensions:
chains.sh: #10238: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128021351Z
nextupdate=20131128021351Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 02:13:51 2012
    Next Update: Thu Nov 28 02:13:51 2013
    CRL Extensions:
chains.sh: #10239: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128021352Z
addcert 20 20121128021352Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 02:13:52 2012
    Next Update: Thu Nov 28 02:13:51 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 02:13:52 2012
    CRL Extensions:
chains.sh: #10240: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128021353Z
addcert 40 20121128021353Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 02:13:53 2012
    Next Update: Thu Nov 28 02:13:51 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 02:13:52 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 02:13:53 2012
    CRL Extensions:
chains.sh: #10241: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10242: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10243: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #10244: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181144 (0x432f6b58)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:42 2012
            Not After : Tue Nov 28 02:13:42 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:b5:cd:c7:43:99:d8:72:0e:33:a5:0f:2b:d4:44:3f:
                    ba:3e:fe:1d:72:9b:18:4f:3c:58:bf:a9:eb:c4:27:0b:
                    eb:c3:57:0f:d3:99:59:7f:f1:cb:4a:d5:5c:fb:56:57:
                    75:66:52:15:78:de:ff:56:d3:8e:d9:7f:6e:af:f8:6d:
                    81:9c:d7:e3:80:2d:4a:95:b2:7d:14:86:a9:13:d8:b1:
                    8c:df:ae:53:8a:8e:ad:ab:f5:b2:bb:dc:d0:f6:3f:a3:
                    4b:fc:ec:d7:3d:52:fe:1d:47:fe:ed:34:3b:de:b1:51:
                    ba:57:3f:69:87:ee:f4:29:ba:46:4a:8d:4c:ee:76:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6d:d8:90:ca:3d:20:6c:ce:6f:14:12:84:87:df:6d:
        c8:25:5f:c8:7a:d0:1a:91:49:7a:15:e3:68:45:c3:c8:
        5e:af:32:45:fd:e5:b1:3d:a2:18:32:f9:7b:ae:ed:6c:
        5e:55:e4:77:af:29:2a:52:ca:f0:16:87:dc:bc:b9:7b:
        23:0f:36:02:a0:2c:1a:ab:b4:54:c6:fd:6c:85:85:b4:
        98:81:e6:10:19:06:d7:29:a0:33:18:e1:15:08:93:5c:
        7a:39:31:b3:4b:4f:b0:33:c5:0d:f0:a6:cf:3d:31:d7:
        18:b0:6e:fb:02:db:8e:df:c3:c5:7b:fd:ba:ef:53:37
    Fingerprint (MD5):
        8B:A4:48:BD:51:39:CB:B9:91:35:74:D7:AA:B6:9B:13
    Fingerprint (SHA1):
        6F:3E:A8:FA:90:55:9F:51:DA:66:71:A5:AD:8D:81:5C:4E:2F:41:7E

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10245: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10246: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127181144 (0x432f6b58)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 02:13:42 2012
            Not After : Tue Nov 28 02:13:42 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:b5:cd:c7:43:99:d8:72:0e:33:a5:0f:2b:d4:44:3f:
                    ba:3e:fe:1d:72:9b:18:4f:3c:58:bf:a9:eb:c4:27:0b:
                    eb:c3:57:0f:d3:99:59:7f:f1:cb:4a:d5:5c:fb:56:57:
                    75:66:52:15:78:de:ff:56:d3:8e:d9:7f:6e:af:f8:6d:
                    81:9c:d7:e3:80:2d:4a:95:b2:7d:14:86:a9:13:d8:b1:
                    8c:df:ae:53:8a:8e:ad:ab:f5:b2:bb:dc:d0:f6:3f:a3:
                    4b:fc:ec:d7:3d:52:fe:1d:47:fe:ed:34:3b:de:b1:51:
                    ba:57:3f:69:87:ee:f4:29:ba:46:4a:8d:4c:ee:76:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:6d:d8:90:ca:3d:20:6c:ce:6f:14:12:84:87:df:6d:
        c8:25:5f:c8:7a:d0:1a:91:49:7a:15:e3:68:45:c3:c8:
        5e:af:32:45:fd:e5:b1:3d:a2:18:32:f9:7b:ae:ed:6c:
        5e:55:e4:77:af:29:2a:52:ca:f0:16:87:dc:bc:b9:7b:
        23:0f:36:02:a0:2c:1a:ab:b4:54:c6:fd:6c:85:85:b4:
        98:81:e6:10:19:06:d7:29:a0:33:18:e1:15:08:93:5c:
        7a:39:31:b3:4b:4f:b0:33:c5:0d:f0:a6:cf:3d:31:d7:
        18:b0:6e:fb:02:db:8e:df:c3:c5:7b:fd:ba:ef:53:37
    Fingerprint (MD5):
        8B:A4:48:BD:51:39:CB:B9:91:35:74:D7:AA:B6:9B:13
    Fingerprint (SHA1):
        6F:3E:A8:FA:90:55:9F:51:DA:66:71:A5:AD:8D:81:5C:4E:2F:41:7E

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10247: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10248: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 31047 at Tue Nov 27 18:13:55 PST 2012
kill -USR1 31047
selfserv: normal termination
httpserv with PID 31047 killed at Tue Nov 27 18:13:55 PST 2012
TIMESTAMP chains END: Tue Nov 27 18:13:55 PST 2012

SUMMARY:
========
NSS variables:
--------------
HOST=nss-vm-darwin9-1
DOMSUF=community.scl3.mozilla.com
BUILD_OPT=1
USE_64=
NSS_CYCLES=""
NSS_TESTS=""
NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr"
NSS_SSL_RUN="cov auth stress"
NSS_AIA_PATH=
NSS_AIA_HTTP=
NSS_AIA_OCSP=
IOPR_HOSTADDR_LIST=
PKITS_DATA=/Users/tinderbox/pkits/data/

Tests summary:
--------------
Passed:             10247
Failed:             1
Failed with core:   0
Unknown status:     0

END_OF_TEST<BR>
TB [2012-11-27 18:13:56] NSS - tests - 32 bits - OPT FAILED

No More Errors